Home page logo
/

dailydave logo Dailydave mailing list archives

Re: Times up!
From: Dave Aitel <dave () immunityinc com>
Date: Fri, 24 Oct 2008 12:38:53 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Is that exploit reliable? It doesn't look like it's using the reliable
variant (according to our very brief RE efforts here - and by "our", I
mean "Kostya's").

Why would someone find such a cool exploit and then not make it
reliable? Does it even work on XP SP2/3?

- -dave


dennis () backtrace de wrote:
That said, it won't take much for someone to write self-replicating code
exploiting this vulnerability.


I can now confirm what has been stated on the ThreatExpert blog. I 
found shellcode at
file offset 0x4712A (or address 0x1004712A in IDA). Simple "sub 1" 
payload decoder,
imports urlmon/UrlDownloadToFileA and WinExec to download a copy of 
the Trojan.

MD5 of basesvc.dll: 82ba009746da8603c463f37e381a42a4

Cheers

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJAfodtehAhL0gheoRAgfRAJ4ic1KT/O4CULl6KGW6INQkwWsC6ACeLu3n
e69eB8w23tu6WsebmIVcufE=
=5SgP
-----END PGP SIGNATURE-----

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]