27 lines
No EOL
835 B
Text
27 lines
No EOL
835 B
Text
..::[ jamikazu presents ]::..
|
|
|
|
Windows Animated Cursor Handling Exploit (0day) (Version3)
|
|
|
|
Works on fully patched Windows Vista
|
|
I think it is first real remote code execution exploit on vista =)
|
|
|
|
Tested on:
|
|
Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled)
|
|
Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled)
|
|
Windows XP SP2
|
|
(It also must to work on all nt based windows but not tested)
|
|
|
|
Update: It also bypass eeye security ani patch!
|
|
|
|
Author: jamikazu
|
|
Mail: jamikazu@gmail.com
|
|
|
|
Bug discovered by determina (http://www.determina.com)
|
|
|
|
Credit: milw0rm,metasploit, SkyLined, http://doctus.net/
|
|
|
|
invokes calc.exe if successful
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3636.zip (04012007-exp.zip)
|
|
|
|
# milw0rm.com [2007-04-01] |