lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed Jul 5 09:19:14 2006 From: saintlinu at gmail.com (Alex Park) Subject: Touch arbitrary file execute vulnerability Title: Touch arbitrary file execute vulnerability Version: Touch Control 2, 0, 0, 55 Discoverer: PARK, GYU TAE (saintlinu@...l2root.org) Advisory No.: NRVA06-04 Critical: Critical Impact: Gain remote user's privilege Where: From remote Operating System: Windows Only Solution: Patched Notice: 16. 06. 2006 initiate notify 19. 06. 2006 Vendor respond but patch yet 19. 06. 2006 Second notified with vulnerable CLSID to KISA(Korea Information Security Agency) 30. 06. 2006 KISA respond but patch yet 04. 07. 2006 KISA respond and patched vulnerability but still have concern a little bit 05. 07. 2006 KISA respond and modified 05. 07. 2006 Disclosure vulnerability Duration of patch: 20 days Description: The 'touch' is VOD(Video On Demand) solution on the net The 'touch' activex has one remote vulnerability. If using an HTML file that crafted by this vulnerability then you'll get somebody's remote privilege. See following detail describe: The 'touch' have Execute() function. this function requests only one argument(sPath). When input to sPath like string 'http://www.somewhere.com' then open with Internet Navigator otherwise you want to hack this activex just input to sPath like 'file///some_driver_letter/somewhere_folder/whatever' then you'll face what you want EXPLOIT NOT INCLUDED HERE -- Make Our Internet Secure With H4ck3rz
Powered by blists - more mailing lists