/*****************************************************************************
* Microsoft Windows .doc File Malformed Pointers DoS *
* *
* *
* *
* Just move your mouse on the file and explorer crashes. If it does not try *
* to look at file properties. *
* Bug comes from Ole32.dll: *
* CMP DWORD PTR DS:[EAX EBX],3 and we can set EAX, EDX and ESI with arbitrary *
* values. *
* *
* Check the file, magic offsets are *
* 4460 -> EDX *
* 4519 -> ESI *
* *
* *
* Successfully tested on Windows 2000 SP4 FR and XP SP2 FR. *
* *
* Coded by Marsu <MarsupilamiPowa@hotmail.fr> *
*****************************************************************************/
【MS Windows (.doc File) Malformed Pointers Denial of Service Exploit】相关文章:
★ Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
★ HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit
★ pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability
★ Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
★ LoveCMS 1.6.2 Final Remote Code Execution Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit