- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 14748
- Проверка EDB
-
- Пройдено
- Автор
- DR_IDE
- Тип уязвимости
- LOCAL
- Платформа
- WINDOWS
- CVE
- cve-2010-3129
- Дата публикации
- 2010-08-25
Код:
###########################################################################
#
# Title: uTorrent <=2.0.3 Dll Hijacking Local Exploits
# By: Dr_IDE
# Tested: Windows 7RC
# Note: These are additional DLL's with unsafe Load Paths
# Reference: http://www.exploit-db.com/exploits/14726/
#
############################################################################
If the payload .DLL file is renamed to any of these files and placed in the
utorrent.exe directory, the payload will be executed with users' credentials.
-userenv.dll
-shfolder.dll
-dnsapi.dll
-dwmapi.dll
-iphlpapi.dll
-dhcpcsvc.dll
-dhcpcsvc6.dll
-rpcrtremote.dll
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz)
#[pocoftheday.blogspot.com]
- Источник
- www.exploit-db.com