exploit-db-mirror/exploits/windows/dos/1110.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

42 lines
No EOL
1.7 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

*/-----------------------------edwardgagnon--------------/*
Can crash msn and execute commands
Windows has a buffer overflow vulnerability in the processing of embedded ICC Profiles
inside images (jpeg, tiff, etc...)
To test - create a jpeg in adobe photoshop and save it with the ICC checkbox enabled,
make sure you set it to RGB (that does not really matter, just so you can find which
bytes to change for the test).
Open in a hex editor and search for "RGB XYZ " (no quotes, case sensitive)
You are now inside the header of the ICC Profile which is 128 bytes.
104 bytes away is a 4 byte number which is the Tag Count of the ICC Profile.
Change this to "FF FF FF FF" (it will be followed by a 4 byte string which is
part of a 12 byte tag. there are several such tags, it should help you identify
which bytes to change).
Save, open in internet explorer, and see the crash.
and this is the crash:
CODE
.text:73B323BC loc_73B323BC: ; CODE XREF: GetColorProfileElement+D6j
.text:73B323BC cmp [ebx], eax
.text:73B323BE jz short loc_73B323DD
.text:73B323C0 add ebx, 0Ch
.text:73B323C3 inc edx
.text:73B323C4 cmp edx, ecx
.text:73B323C6 jb short loc_73B323BC
.text:73B323C8
.text:73B323C8 loc_73B323C8: ; CODE XREF: GetColorProfileElement+CAj
.text:73B323C8 push 7DCh ; dwErrCode
.text:73B323CD call ds:SetLastError
ebx is controlable. but gets a read access violation.
....be kool and create a PoC and change your sig to the exploit.jpg
# milw0rm.com [2005-07-15]