lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030309003828.GA58103@sv98.s0h.cc>
Date: Sun, 9 Mar 2003 00:38:28 +0000
From: descript <descript@...8.s0h.cc>
To: vuln-dev@...urityfocus.com;, bugtraq@...urityfocus.com
Subject: Win32hlp exploit for : ":LINK overflow"


hi list,

In date Sunday, 9 March, 2003 1:00 AM s0h released an exploit : Win32hlp exploit for : ":LINK overflow"

Source : http://s0h.cc/exploit/s0h_Win32hlp.c
Binary : http://s0h.cc/exploit/s0h_Win32hlp.exe

Discovered by ThreaT <threat@....cc>.
Coded by ThreaT <threat@....cc>
Hompage : http://s0h.cc/~threat/

This exploit can trap a .CNT file (file with .HLP files) with the arbitrary code who can download and execute a trojan without user ask.

This exploit was tested on :
	- Windows 2000 PRO/SERVER (fr) SP0
	- Windows 2000 PRO/SERVER (fr) SP1
	- Windows 2000 PRO/SERVER (fr) SP2


Best regards,
descript <descript@....cc>
s0h - Skin of humanity
http://s0h.cc



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ