21 lines
No EOL
719 B
Text
21 lines
No EOL
719 B
Text
EMR_COLORMATCHTOTARGETW stack buffer overflow exploit
|
|
By Ac!dDrop
|
|
|
|
This is one of the 2 Vulnerabilities of MS08-021
|
|
|
|
Tested on Windows xp professional SP1
|
|
GDi32.dll 5.1.2600.1106
|
|
kernel32.dll 5.1.2600.1106
|
|
ws2_32.dll 5.1.2600.0
|
|
|
|
calc.zip---> executes calculator
|
|
IE.zip and localhost.zip ------> connects at localhost at port 230
|
|
|
|
|
|
On Windows Xp Sp2 only causes Denial of service.
|
|
-(Vulnerable function guarded with a GS cookie)
|
|
-(The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page ).
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6656.tgz (2008-Gdi.tgz)
|
|
|
|
# milw0rm.com [2008-10-02] |