- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 3636
- Проверка EDB
-
- Пройдено
- Автор
- JAMIKAZU
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2007-1765 cve-2007-0038
- Дата публикации
- 2007-04-01
Код:
..::[ jamikazu presents ]::..
Windows Animated Cursor Handling Exploit (0day) (Version3)
Works on fully patched Windows Vista
I think it is first real remote code execution exploit on vista =)
Tested on:
Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows XP SP2
(It also must to work on all nt based windows but not tested)
Update: It also bypass eeye security ani patch!
Author: jamikazu
Mail: [email protected]
Bug discovered by determina (http://www.determina.com)
Credit: milw0rm,metasploit, SkyLined, http://doctus.net/
invokes calc.exe if successful
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3636.zip (04012007-exp.zip)
# milw0rm.com [2007-04-01]
- Источник
- www.exploit-db.com