Internet Explorer tblinf32.dll ActiveX IObjectsafety vulnerability
Added: 08/17/2007CVE: CVE-2007-2216
BID: 25289
OSVDB: 36396
Background
The IObjectsafety interface provides methods to get and set safety options for objects which support untrusted clients.Problem
The tblinf32.dll ActiveX control implements IObjectsafety incorrectly, allowing execution of code from arbitrary DLLs when a user loads a specially crafted web page.Resolution
Apply the patch referenced in Microsoft Security Bulletin 07-045.References
http://www.microsoft.com/technet/security/bulletin/ms07-045.mspxLimitations
Exploit works on Microsoft Visual Studio 6.0 on Windows 2000 and XP and requires a user to load the exploit page into Internet Explorer 6 or 7.As a prerequisite for this exploit, the exploit DLL must be placed on an SMB share which is accessible by the target. To do so, first start the exploit, then download the file http://address:port/exploit1.dll, where address is the address of the SAINTexploit host and port is the exploit port, and save exploit1.dll on the SMB share.
When running the exploit, the share should be specified as COMPUTER/SHARE, where COMPUTER is the NetBIOS name of the computer and SHARE is the name of the share.
Platforms
WindowsBack to exploit index