1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [x] Official Website: http://www.1337day.com 0 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1 0 0 1 ========================================== 1 0 I'm Dark-Puzzle From Inj3ct0r TEAM 0 0 1 1 dark-puzzle[at]live[at]fr 0 0 ========================================== 1 1 Pentesting/exploit coding/bug research 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1 [0day Exploits] Allah , Alwatan , Almalik .[0day Exploits] HIGH RISK EXPLOIT . USE THIS EXPLOIT AT YOUR OWN RISK I'M NOT RESPONSIBLE OF ANY HARM . USE THIS EXPLOIT AT YOUR OWN RISK I'M NOT RESPONSIBLE OF ANY HARM . USE THIS EXPLOIT AT YOUR OWN RISK I'M NOT RESPONSIBLE OF ANY HARM . #Exploit name : Internet Mobile - Maroc Telecom (HUAWEI Technologies) Exception handling vulnerability #Author : Dark-Puzzle ($0uH@iL) #Type : Remote . #Risk : High #Vulnerable Version : 11.302.09.05.162 (Other Versions [If Available] May Also Be Vulnerable) #Software Vendor : HUAWEI Technologies & Maroc Telecom . #Software Link : Software is Installed Via The 3G connection modem. #Date : 28 June 2012 . -------------------------------------------------------------------------------------------------------- Exploit : The Program Was Enabled To process the Exception . The Exception is an access Violation to EAX by Flooding the CX in the ECX Register. [Imp Registers] : EAX 00190000 ASCII "Actx" ECX 00000041 [Exception Handling In Main Thread] Disassembly : TEST ECX,ECX JE SHORT COMCTL32.720AB00B MOVZX ECX,WORD PTR DS:[EDX+EAX] TEST CX,CX JE SHORT COMCTL32.720AB00B MOV WORD PTR DS:[EAX],CX <<----- Access Violation = Exception Handling Vulnerability . INC EAX INC EAX DEC ESI JNZ SHORT COMCTL32.720AAFF3 --------------------------------------------------------------------------------------------------------- Risks : HIGH The program is crashed when Executing it . ( Double click , the interface is shown up, charging boutton is up then Boom Crash ) . This exploit in the HUAWEI Modem is concidered a high one beacause the Attacker can edit the XML and lang files reffering to direct DLLs . Which can cause in most of the times an edit of sensitive Lines. So , the attacker can have the privileges to bypass the program Authetification or to use the exception handling to DoS the users program until it's reinstalled (Not Restarded) . A normal user can't know the source of the crash problem which is related to the XML files . Nobody search or read in these files most of the times . Then he will stay without Internet connection for a no short period of time , until reinstalling the program or contacting the vendor . ---------------------------------------------------------------------------------------------------------- How To Exploit : (USE IT AT YOUR OWN RISK , Je ne suis pas responsable de ce qui est fait par cette vulnerabilité) I'm not responsible of any harm . Go to ----> C:\Progam Files\Internet Mobile\plugins\SMSUIPlugin (FOR Example) Now open the lang files ---> French And English . SMSUIPlugin_fr-fr and SMSUIPlugin_en-us Replace the line : <item name="IDS_PLUGIN_NAME">Texte</item> and <item name="IDS_PLUGIN_MENUITEM">Message &Texte</item> and this one <item name="IDS_TREE_DINBOX">Boite de réception</item> Same Names just in english instead french ------------------------------------------- Replace them with that (for example) : This : <item name="IDS_PLUGIN_NAME">Texte</item> Will become This : <item name="IDS_PLUGIN_NAME"> Very Very Very Huge Number Of AAA or whatever </item> and the same thing for the other lines shown before . This will make the program Crash when it's opened . The victim will be not able to run the software again until it's reinstalled . A script will be soon available to replace automatically the Lang files . ( PoC ) ----------------------------------------------------------------------------------------------------- Dark-Puzzle (Souhail) . \x90 Follow me : fb.me/dark.puzzle \x90 Follow Moroccan Cyber Army : https://www.facebook.com/MAR.Cyber.Army \x90 Greetz to : M.C.A , Team-Hunter , Jigs@w , All Inj3ct0r team Members , Packetstromsecurity.org , Ar-Devlopers.... \x90 Pentesting is my LIFE . \x90 GREY HAT Mercy From M0rocC0 .