- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6656
- Проверка EDB
-
- Пройдено
- Автор
- AC!DDROP
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2008-1087 cve-2008-1083
- Дата публикации
- 2008-10-02
Код:
EMR_COLORMATCHTOTARGETW stack buffer overflow exploit
By Ac!dDrop
This is one of the 2 Vulnerabilities of MS08-021
Tested on Windows xp professional SP1
GDi32.dll 5.1.2600.1106
kernel32.dll 5.1.2600.1106
ws2_32.dll 5.1.2600.0
calc.zip---> executes calculator
IE.zip and localhost.zip ------> connects at localhost at port 230
On Windows Xp Sp2 only causes Denial of service.
-(Vulnerable function guarded with a GS cookie)
-(The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page ).
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6656.tgz (2008-Gdi.tgz)
# milw0rm.com [2008-10-02]
- Источник
- www.exploit-db.com