[26162] in bugtraq

home help back first fref pref prev next nref lref last post

MFC Overflow Test Code

daemon@ATHENA.MIT.EDU (Matthew Murphy)
Fri Jul 12 22:25:32 2002

Message-ID: <000e01c229ff$52ec1c80$e62d1c41@kc.rr.com>
From: "Matthew Murphy" <mattmurphy@kc.rr.com>
To: <vuldb@securityfocus.com>, <bugtraq@securityfocus.com>
Date: Fri, 12 Jul 2002 18:53:30 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

I have been working on a piece of test code for the MFC
buffer overflow reported in BID 5188.  The code has now
been completed.

The exploit is simply a DoS exploit that will overwrite heap
data in a vulnerable ISAPI with 0x41 characters ('A').

The overwritten data contains pointers accessed by MFC42.DLL,
usually resulting in an access violation.

Exploit Code: http://www.murphy.101main.net/mfcisapi.c
Advisory: http://www.murphy.101main.net/vulns/2002-12.shtml

"The reason the mainstream is thought
of as a stream is because it is
so shallow."
                     - Author Unknown


home help back first fref pref prev next nref lref last post