[35781] in bugtraq

home help back first fref pref prev next nref lref last post

RE: Unchecked buffer in mstask.dll

daemon@ATHENA.MIT.EDU (Dmitry Yu. Bolkhovityanov)
Sun Jul 18 23:16:42 2004

Date: Fri, 16 Jul 2004 11:22:28 +0700
From: "Dmitry Yu. Bolkhovityanov" <D.Yu.Bolkhovityanov@inp.nsk.su>
To: Paul Szabo <psz@maths.usyd.edu.au>
Cc: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com,
        tlarholm@pivx.com, brett.moore@security-assessment.com
In-Reply-To: <200407142350.i6ENoHJ85368@milan.maths.usyd.edu.au>
Message-ID: <Pine.SGI.4.10.10407161109410.1328-100000@Sky.inp.nsk.su>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Thu, 15 Jul 2004, Paul Szabo wrote:

> Being curious, on Win2k, I copied cmd.exe (from winnt\system32) as xyz.pif;
> then (right-click) Properties, Program crashes explorer. Is this related to
> IconHandler, and is it exploitable?

	Right -- in Win2K SP4 clicking on [Program] tab of Properties
window causes "access violation" -- the memory at 0x00000000 could not be
"read" by SHELL32.DLL.  MSVC++, acting as a debugger, shows a mixture of
KERNEL32, COMCTL32, USER32, SHELL32 and SHLWAPI in stack trace.

	Disassembly window shows that there was an attempt to read dword
at [EAX] (EAX=0).  So at first glance this doesn't seem to be trivially
exploitable, but I'm not a win32 expert, and intuition suggests that there
must be a way.

	_________________________________________
	  Dmitry Yu. Bolkhovityanov
	  The Budker Institute of Nuclear Physics
	  Novosibirsk, Russia


home help back first fref pref prev next nref lref last post