The poc code can be found here im working on getting shell code execution over the next day or 2 as im working on 3 exploits already atm.And am very busy.
Btw His0k4 your exploits don't work
---------------------------------------------
Here is the poc code for the overflow.
Winamp 5.551 MAKI Parsing Integer Overflow PoC
---------------------------------------------
I managed to get shell code executed over the weekend and
the exploit has been sent over at milwr0m.
I will update with a link as soon as it goes
up and Also works for vista sp1 and windows xpsp3
Please stay tuned im working on a few integer overflows
of my own.
Here is the working exploit code for the overflow.
Winamp 5.551 MAKI Parsing Integer Overflow Exploit
Friday, 22 May 2009
Thursday, 7 May 2009
Possible openoffice.org v3.1 function pointer manipulation /Integer overflow
I was not sure how to class this bug as i never done any research covering integer overflow's or function pointer manipulation.
The write access violation was found by replacing bytes within a specially crafted spread sheet.
I am getting in touch with a few people to see if exploitation is possible or feezable to run arbitrary code execution.
Will update in a few days.
:Update:
Information has been submitted to a company for further analysis.
The write access violation was found by replacing bytes within a specially crafted spread sheet.
I am getting in touch with a few people to see if exploitation is possible or feezable to run arbitrary code execution.
Will update in a few days.
:Update:
Information has been submitted to a company for further analysis.
Subscribe to:
Posts (Atom)