mailing list archives
Re: CVE-2009-3129 and CVE-2010-1297
From: polychrom () fastmail fm
Date: Wed, 16 Jun 2010 16:17:32 -0500
No. Integrate to Metasploit. Existing exploitation methods(set remote
connection) are very plain and not interesting for advanced pen-testing.
Just plain remote shell, nothing more.
On Wed, 16 Jun 2010 22:59 +0200, "MaXe" <metafan () intern0t net> wrote:
polychrom () fastmail fm wrote:
Both these exploits used to set reverse connection to specified port,
but is it possible rebuild this exploits to download and execute file
from URL? When payload executed , it will download file from remote URL
and execute it.
On Wed, 16 Jun 2010 14:37 -0500, "Joshua J. Drake"
<jdrake () metasploit com> wrote:
On Wed, Jun 16, 2010 at 01:34:03PM -0500, polychrom () fastmail fm wrote:
What commands to use to create Excel and PDF files exploiting
CVE-2009-3129 (Remote exploitation of a memory corruption vulnerability
in Microsoft Excel) and CVE-2010-1297 (Adobe 0 Day by Joshua J. Drake).
When I open console, what is commands to create this exploit files, and
save it on hard drive.
You can see the commands to execute in the black box via the module
browser on the main site.
Joshua J. Drake
It should be possible but what you're trying to do, sounds like
integrating these exploits into a Browser Exploitation Pack / Kit for
http://www.fastmail.fm - IMAP accessible web-mail
Adobe Doc.media.newPlayer Use After Free Vulnerability polychrom (Jun 18)