lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed Jul  5 09:19:14 2006
From: saintlinu at gmail.com (Alex Park)
Subject: Touch arbitrary file execute vulnerability

Title:             Touch arbitrary file execute vulnerability

Version:           Touch Control 2, 0, 0, 55

Discoverer:        PARK, GYU TAE (saintlinu@...l2root.org)

Advisory No.:      NRVA06-04

Critical:          Critical

Impact:            Gain remote user's privilege

Where:             From remote

Operating System:  Windows Only

Solution:          Patched

Notice:            16. 06. 2006 initiate notify
                   19. 06. 2006 Vendor respond but patch yet
                   19. 06. 2006 Second notified with vulnerable CLSID
to KISA(Korea Information Security Agency)
                   30. 06. 2006 KISA respond but patch yet
                   04. 07. 2006 KISA respond and patched vulnerability
but still have concern a little bit
                   05. 07. 2006 KISA respond and modified
                   05. 07. 2006 Disclosure vulnerability

Duration of patch: 20 days

Description:

The 'touch' is VOD(Video On Demand) solution on the net

The 'touch' activex has one remote vulnerability.
If using an HTML file that crafted by this vulnerability then you'll
get somebody's remote privilege.

See following detail describe:

The 'touch' have Execute() function. this function requests only one
argument(sPath).
When input to sPath like string 'http://www.somewhere.com' then open
with Internet Navigator
otherwise you want to hack this activex just input to sPath like
'file///some_driver_letter/somewhere_folder/whatever'
then you'll face what you want

EXPLOIT NOT INCLUDED HERE

-- 
Make Our Internet Secure With H4ck3rz

Powered by blists - more mailing lists