27 lines
No EOL
873 B
Text
27 lines
No EOL
873 B
Text
..::[ jamikazu presents ]::..
|
|
|
|
Windows Animated Cursor Handling Exploit (0day) (Version3)
|
|
|
|
Works on fully patched Windows Vista
|
|
I think it is first real remote code execution exploit on vista =)
|
|
|
|
Tested on:
|
|
Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled)
|
|
Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled)
|
|
Windows XP SP2
|
|
(It also must to work on all nt based windows but not tested)
|
|
|
|
Update: It also bypass eeye security ani patch!
|
|
|
|
Author: jamikazu
|
|
Mail: jamikazu@gmail.com
|
|
|
|
Bug discovered by determina (http://www.determina.com)
|
|
|
|
Credit: milw0rm,metasploit, SkyLined, http://doctus.net/
|
|
|
|
invokes calc.exe if successful
|
|
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/3636.zip (04012007-exp.zip)
|
|
|
|
# milw0rm.com [2007-04-01] |