Touch Control is susceptible to a remote file execution vulnerability.
a5cdb563932079eead91fa88877eef5639e20694b86983fbc406bc78205a4a39
Title: Touch arbitrary file execute vulnerability
Version: Touch Control 2, 0, 0, 55
Discoverer: PARK, GYU TAE (saintlinu@null2root.org)
Advisory No.: NRVA06-04
Critical: Critical
Impact: Gain remote user's privilege
Where: From remote
Operating System: Windows Only
Solution: Patched
Notice: 16. 06. 2006 initiate notify
19. 06. 2006 Vendor respond but patch yet
19. 06. 2006 Second notified with vulnerable CLSID
to KISA(Korea Information Security Agency)
30. 06. 2006 KISA respond but patch yet
04. 07. 2006 KISA respond and patched vulnerability
but still have concern a little bit
05. 07. 2006 KISA respond and modified
05. 07. 2006 Disclosure vulnerability
Duration of patch: 20 days
Description:
The 'touch' is VOD(Video On Demand) solution on the net
The 'touch' activex has one remote vulnerability.
If using an HTML file that crafted by this vulnerability then you'll
get somebody's remote privilege.
See following detail describe:
The 'touch' have Execute() function. this function requests only one
argument(sPath).
When input to sPath like string 'http://www.somewhere.com' then open
with Internet Navigator
otherwise you want to hack this activex just input to sPath like
'file///some_driver_letter/somewhere_folder/whatever'
then you'll face what you want
EXPLOIT NOT INCLUDED HERE
--
Make Our Internet Secure With H4ck3rz