exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

touchControl.txt

touchControl.txt
Posted Jul 9, 2006
Authored by Gyu Tae Park

Touch Control is susceptible to a remote file execution vulnerability.

tags | advisory, remote
SHA-256 | a5cdb563932079eead91fa88877eef5639e20694b86983fbc406bc78205a4a39

touchControl.txt

Change Mirror Download
Title:             Touch arbitrary file execute vulnerability

Version: Touch Control 2, 0, 0, 55

Discoverer: PARK, GYU TAE (saintlinu@null2root.org)

Advisory No.: NRVA06-04

Critical: Critical

Impact: Gain remote user's privilege

Where: From remote

Operating System: Windows Only

Solution: Patched

Notice: 16. 06. 2006 initiate notify
19. 06. 2006 Vendor respond but patch yet
19. 06. 2006 Second notified with vulnerable CLSID
to KISA(Korea Information Security Agency)
30. 06. 2006 KISA respond but patch yet
04. 07. 2006 KISA respond and patched vulnerability
but still have concern a little bit
05. 07. 2006 KISA respond and modified
05. 07. 2006 Disclosure vulnerability

Duration of patch: 20 days

Description:

The 'touch' is VOD(Video On Demand) solution on the net

The 'touch' activex has one remote vulnerability.
If using an HTML file that crafted by this vulnerability then you'll
get somebody's remote privilege.

See following detail describe:

The 'touch' have Execute() function. this function requests only one
argument(sPath).
When input to sPath like string 'http://www.somewhere.com' then open
with Internet Navigator
otherwise you want to hack this activex just input to sPath like
'file///some_driver_letter/somewhere_folder/whatever'
then you'll face what you want

EXPLOIT NOT INCLUDED HERE

--
Make Our Internet Secure With H4ck3rz
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close