首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
RealNetworks RealGames StubbyUtil.ProcessMgr.1 ActiveX Control Multiple Remote C
来源:http://retrogod.altervista.org 作者:rgod 发布时间:2011-04-06  

RealNetworks RealGames StubbyUtil.ProcessMgr.1 ActiveX Control
(InstallerDlg.dll v2.6.0.445) Multiple Remote Commands Execution
Vulnerabilities

tested against Internet Explorer 9, Vista sp2

download url: http://www.gamehouse.com/

background:

When choosing to play with theese online games ex. the game called
"My Farm Life" (see url: http://www.gamehouse.com/download-games/my-farm-life )
you download an installer called GameHouse-Installer_am-myfarmlife_gamehouse_.exe

This setup program installs an ActiveX with the following settings:

CLSID: {5818813E-D53D-47A5-ABBB-37E2A07056B5}
Progid: StubbyUtil.ProcessMgr.1
Binary Path: C:\Program Files\RealArcade\Installer\bin\InstallerDlg.dll
Safe For Initialization (Registry): True
Safe For Scripting (Registry): True

This control is safe for scripting and safe for initialization,
so Internet Explorer will allow scripting of this control from
remote.

vulnerability:

This control has four methods implemented insecurely:

CreateVistaTaskLow()      -> allows to launch arbitrary commands
Exec()                    -> allows to launch arbitrary commands
ExecLow()                 -> allows to launch arbitrary commands
ShellExec()               -> allows to launch arbitrary executables

other attacks are possible ,
see typelib:

class IProcessMgr { /* GUID={860450DB-79C1-44E4-96E0-C89144E4B444} */
 /* DISPID=1610612736 */
 function QueryInterface(
  /* VT_PTR [26] [in] --> ? [29]  */ &$riid,
  /* VT_PTR [26] [out] --> VT_PTR [26]  */ &$ppvObj
  )
 {
 }
 /* DISPID=1610612737 */
 /* VT_UI4 [19] */
 function AddRef(
  )
 {
 }
 /* DISPID=1610612738 */
 /* VT_UI4 [19] */
 function Release(
  )
 {
 }
 /* DISPID=1610678272 */
 function GetTypeInfoCount(
  /* VT_PTR [26] [out] --> VT_UINT [23]  */ &$pctinfo
  )
 {
 }
 /* DISPID=1610678273 */
 function GetTypeInfo(
  /* VT_UINT [23] [in] */ $itinfo,
  /* VT_UI4 [19] [in] */ $lcid,
  /* VT_PTR [26] [out] --> VT_PTR [26]  */ &$pptinfo
  )
 {
 }
 /* DISPID=1610678274 */
 function GetIDsOfNames(
  /* VT_PTR [26] [in] --> ? [29]  */ &$riid,
  /* VT_PTR [26] [in] --> VT_PTR [26]  */ &$rgszNames,
  /* VT_UINT [23] [in] */ $cNames,
  /* VT_UI4 [19] [in] */ $lcid,
  /* VT_PTR [26] [out] --> VT_I4 [3]  */ &$rgdispid
  )
 {
 }
 /* DISPID=1610678275 */
 function Invoke(
  /* VT_I4 [3] [in] */ $dispidMember,
  /* VT_PTR [26] [in] --> ? [29]  */ &$riid,
  /* VT_UI4 [19] [in] */ $lcid,
  /* VT_UI2 [18] [in] */ $wFlags,
  /* VT_PTR [26] [in] --> ? [29]  */ &$pdispparams,
  /* VT_PTR [26] [out] --> VT_VARIANT [12]  */ &$pvarResult,
  /* VT_PTR [26] [out] --> ? [29]  */ &$pexcepinfo,
  /* VT_PTR [26] [out] --> VT_UINT [23]  */ &$puArgErr
  )
 {
 }
 /* DISPID=1 */
 /* VT_BOOL [11] */
 function Exec(
  /* VT_PTR [26] [in] --> VT_BSTR [8]  */ &$mod,
  /* VT_PTR [26] [in] --> VT_BSTR [8]  */ &$cmdline,
  /* VT_BOOL [11] [in] */ $__MIDL_0097,
  /* VT_BOOL [11] [in] */ $__MIDL_0098,
  /* VT_PTR [26] [in] --> VT_BSTR [8]  */ &$__MIDL_0099
  )
 {
  /* method Exec */
 }
 /* DISPID=2 */
 /* VT_BOOL [11] */
 function IsFinished(
  )
 {
 }
 /* DISPID=3 */
 /* VT_UI4 [19] */
 function CreateNamedMutex(
  /* VT_BSTR [8] [in] */ $__MIDL_0102
  )
 {
 }
 /* DISPID=4 */
 function ReleaseMutex(
  /* VT_UI4 [19] [in] */ $__MIDL_0104
  )
 {
 }
 /* DISPID=5 */
 function CloseMutex(
  /* VT_UI4 [19] [in] */ $__MIDL_0105
  )
 {
 }
 /* DISPID=6 */
 /* VT_BOOL [11] */
 function ObtainMutex(
  /* VT_UI4 [19] [in] */ $__MIDL_0106
  )
 {
 }
 /* DISPID=7 */
 /* VT_BOOL [11] */
 function WaitOnMutex(
  /* VT_UI4 [19] [in] */ $__MIDL_0108,
  /* VT_INT [22] [in] */ $__MIDL_0109
  )
 {
 }
 /* DISPID=8 */
 function CloseEvent(
  /* VT_UI4 [19] [in] */ $__MIDL_0111
  )
 {
 }
 /* DISPID=9 */
 function FireEvent(
  /* VT_UI4 [19] [in] */ $__MIDL_0112
  )
 {
 }
 /* DISPID=10 */
 /* VT_UI4 [19] */
 function CreateNamedEvent(
  /* VT_BSTR [8] [in] */ $__MIDL_0113
  )
 {
 }
 /* DISPID=11 */
 /* VT_UI4 [19] */
 function ExitCode(
  )
 {
 }
 /* DISPID=12 */
 function CreateVistaTaskLow(
  /* VT_BSTR [8] [in] */ $bstrExecutablePath,
  /* VT_BSTR [8] [in] */ $bstrArguments,
  /* VT_BSTR [8] [in] */ $workDir
  )
 {
 }
 /* DISPID=13 */
 /* VT_BOOL [11] */
 function ExecLow(
  /* VT_BSTR [8] [in] */ $__MIDL_0116,
  /* VT_BSTR [8] [in] */ $cmdline,
  /* VT_PTR [26] [in] --> VT_BSTR [8]  */ &$workDir
  )
 {
 }
 /* DISPID=14 */
 function ShellExec(
  /* VT_BSTR [8] [in] */ $__MIDL_0117
  )
 {
 }
 /* DISPID=15 */
 function Sleep(
  /* VT_UI4 [19] [in] */ $__MIDL_0118
  )
 {
 }
}


binary info:
>lm -vm
    Image path: C:\Program Files\RealArcade\Installer\bin\InstallerDlg.dll
    Image name: InstallerDlg.dll
    Timestamp:        Mon Mar 14 14:22:44 2011 (4D7E6B04)
    CheckSum:         00000000
    ImageSize:        00064000
    File version:     2.6.0.445
    Product version:  2.6.0.445
    File flags:       0 (Mask 3F)
    File OS:          4 Unknown Win32
    File type:        2.0 Dll
    File date:        00000000.00000000
    Translations:     0409.04b0
    ProductName:      InstallerDlg Module
    InternalName:     InstallerDlg
    OriginalFilename: InstallerDlg.dll
    ProductVersion:   2.6.0.445
    FileVersion:      2.6.0.445
    FileDescription:  InstallerDlg Module
    LegalCopyright:   Copyright 2010

poc:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html
                      http://www.exploit-db.com/sploits/9sg_StubbyUtil.ProcessMgr.1.zip


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·RealNetworks RealGames StubbyU
·Encore ENPS-2012 Cross-site Sc
·Movie Player 4.82 Denial Of Se
·GNU glibc < 2.12.2 'fnmatch()'
·Windows Media Player 11.0.5721
·eXPert PDF Convert to Word v7
·IPComp encapsulation pre-auth
·GOM Media Player 2.1.6.3499 0D
·Xilisoft Video Converter Ultim
·Real player 14.0.2.633 0day Bu
·IBM Lotus Domino iCalendar MAI
·Word List Builder Buffer Overf
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved