Exploit Microsoft Windows - Animated Cursor '.ani' Remote (eeye patch Bypass)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3636
Проверка EDB
  1. Пройдено
Автор
JAMIKAZU
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2007-1765 cve-2007-0038
Дата публикации
2007-04-01
Код:
..::[ jamikazu presents ]::..

Windows Animated Cursor Handling Exploit (0day) (Version3)

Works on fully patched Windows Vista
I think it is first real remote code execution exploit on vista =)

Tested on:
Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows XP SP2 
(It also must to work on all nt based windows but not tested)

Update: It also bypass eeye security ani patch!

Author: jamikazu 
Mail: [email protected]

Bug discovered by determina (http://www.determina.com)

Credit: milw0rm,metasploit, SkyLined, http://doctus.net/

invokes calc.exe if successful 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3636.zip (04012007-exp.zip)

# milw0rm.com [2007-04-01]
 
Источник
www.exploit-db.com

Похожие темы