[38003] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Microsoft Windows LoadImage API IntegerBuffer overflow

daemon@ATHENA.MIT.EDU (Berend-Jan Wever)
Tue Dec 28 18:55:31 2004

Message-ID: <22074.213.148.227.187.1104004661.squirrel@www.edup.tudelft.nl>
In-Reply-To: <20041225022705.0CE2C19C70@xfocus.org>
Date: Sat, 25 Dec 2004 20:57:41 +0100 (CET)
From: "Berend-Jan Wever" <skylined@edup.tudelft.nl>
To: "bugtraq@securityfocus.com" <bugtraq@securityfocus.com>,
        "full-disclosure@lists.netsys.com" <full-disclosure@lists.netsys.com>
Reply-To: skylined@edup.tudelft.nl
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit

Since the exploit published by flashsky is a rip off of my IE exploit
script published in the IFRAME exploit, it will probably be caught by some
IDS/AV signatures as being the IFRAME exploit.

Cheers,

SkyLined


>
>     This vul can be exploited, at
> http://www.xfocus.net/flashsky/icoExp/index.html ,i give a test
> exp(open 28876 port) for windows xp sp1, but it need html sctipt run
> and allocate memory.
>
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


home help back first fref pref prev next nref lref last post