Microsoft Windows 9x IE5/Telnet Heap Overflow Vulnerability

Quoted verbatim from Jeremy Kothe's post to Bugtraq:
I have worked out an exploit which downloads and runs an arbitrary file, and have included the source for a Visual C++ program to create a binary file containing the exploit as a link. Add (for example) an html header and footer, and you have it.

Notes: The exploit uses URLDownloadToCacheFile and WinExec. Disassembling the binary file will show you the code (strings have been xor'ed with 0xFADE). Any comments on the exploit code would be appreciated.


 

Privacy Statement
Copyright 2010, SecurityFocus