[30615] in bugtraq

home help back first fref pref prev next nref lref last post

rundll32.exe buffer overflow

daemon@ATHENA.MIT.EDU (Rick)
Mon Jul 7 16:15:53 2003

From: "Rick" <rikul@bellsouth.net>
To: <bugtraq@securityfocus.com>
Date: Sun, 6 Jul 2003 12:42:42 -0600
Message-ID: <000a01c343ee$62342d90$0100a8c0@ark>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi,

 

There is buffer overflow in rundll32.exe when it is passed big string as
routine name for a module. I've tested this on WindowsXP SP1. But other
version of windows might be vuln.  

 

rundll32.exe  advpack32.dll,<'A'x499>   

 

advpack32.dll is just example. Any executable/dll  will work. The
cmdline does get converted to UNICODE. And EIP ends up being 00410041. 

 

-

Rick Patel


home help back first fref pref prev next nref lref last post