Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: Microsoft Windows LoadImage API IntegerBuffer overflow
From: "Berend-Jan Wever" <skylined () edup tudelft nl>
Date: Sat, 25 Dec 2004 20:57:41 +0100 (CET)

Since the exploit published by flashsky is a rip off of my IE exploit
script published in the IFRAME exploit, it will probably be caught by some
IDS/AV signatures as being the IFRAME exploit.

Cheers,

SkyLined



    This vul can be exploited, at
http://www.xfocus.net/flashsky/icoExp/index.html ,i give a test
exp(open 28876 port) for windows xp sp1, but it need html sctipt run
and allocate memory.





_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



  By Date           By Thread  

Current thread:
  • Re: Microsoft Windows LoadImage API IntegerBuffer overflow Berend-Jan Wever (Dec 28)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault