Aladdin eToken PKI Client v4.5 Virtual File Handling Unspecified Memory Corruption PoC

Title: Aladdin eToken PKI Client v4.5 Virtual File Handling Unspecified Memory Corruption PoC
Advisory ID: ZSL-2010-4933
Type: Local/Remote
Impact: System Access, DoS
Risk: (3/5)
Release Date: 11.04.2010
Summary
The eToken PKI Client is the software that enables eToken USB operation and the implementation of eToken PKI-based solutions. These solutions include certificate-based strong two-factor authentication, encryption and digital signing. With the PKI Client your PKI solutions become highly secure, extremely convenient and portable, as you can easily and securely generate and store PKI keys on-board eToken smart card-based devices.
Description
eToken PKI Client is prone to an unspecified memory-corruption vulnerability. An attacker can exploit this issue by tricking a victim into opening a malicious ETV file to execute arbitrary code and to cause denial-of-service conditions.

--------------------------------------------------------------------------------

(154c.a74): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=00000000 ecx=00000000 edx=01730002 esi=00000000 edi=0012fc90
eip=0045d3d3 esp=001282b0 ebp=00128304 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010202
*** ERROR: Module load completed but symbols could not be loaded for etProps.exe
etProps+0x5d3d3:
0045d3d3 8b8ea4000000 mov ecx,dword ptr [esi+0A4h] ds:0023:000000a4=????????

--------------------------------------------------------------------------------

Vendor
Aladdin Knowledge Systems Ltd. - http://www.aladdin.com
Affected Version
4.5.52
Tested On
Microsoft Windows XP Professional SP3 (English)
Vendor Status
[31.05.2010] The vendor released eToken PKI Client version 5.1 to address this issue.
PoC
etoken_mc.pl
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] http://www.exploit-db.com/exploits/12161
[2] http://www.securityfocus.com/bid/39370
[3] http://bug.zerobox.org/show-1888-1.html
[4] http://packetstormsecurity.org/filedesc/aladdinetoken-poc.txt.html
[5] http://www.juniper.net/security/auto/vulnerabilities/vuln39370.html
[6] http://www.vfocus.net/art/20100413/6928.html
[7] http://sebug.net/exploit/19439/
[8] http://securityreason.com/exploitalert/8114
[9] http://www.7747.net/Article/201004/46479.html
[10] http://www.net-security.org/vuln.php?id=12095
Changelog
[11.04.2010] - Initial release
[12.04.2010] - Added reference [1], [2] and [3]
[14.04.2010] - Added reference [4], [5], [6] and [7]
[15.04.2010] - Added reference [8]
[18.04.2010] - Added reference [9]
[21.04.2010] - Added reference [10]
[31.05.2010] - Updated Vendor Status
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk