|
Microsoft Windows 9x IE5/Telnet Heap Overflow Vulnerability
Quoted verbatim from Jeremy Kothe's post to Bugtraq: I have worked out an exploit which downloads and runs an arbitrary file, and have included the source for a Visual C++ program to create a binary file containing the exploit as a link. Add (for example) an html header and footer, and you have it. Notes: The exploit uses URLDownloadToCacheFile and WinExec. Disassembling the binary file will show you the code (strings have been xor'ed with 0xFADE). Any comments on the exploit code would be appreciated. |
|
Privacy Statement |