[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030309003828.GA58103@sv98.s0h.cc>
Date: Sun, 9 Mar 2003 00:38:28 +0000
From: descript <descript@...8.s0h.cc>
To: vuln-dev@...urityfocus.com;, bugtraq@...urityfocus.com
Subject: Win32hlp exploit for : ":LINK overflow"
hi list,
In date Sunday, 9 March, 2003 1:00 AM s0h released an exploit : Win32hlp exploit for : ":LINK overflow"
Source : http://s0h.cc/exploit/s0h_Win32hlp.c
Binary : http://s0h.cc/exploit/s0h_Win32hlp.exe
Discovered by ThreaT <threat@....cc>.
Coded by ThreaT <threat@....cc>
Hompage : http://s0h.cc/~threat/
This exploit can trap a .CNT file (file with .HLP files) with the arbitrary code who can download and execute a trojan without user ask.
This exploit was tested on :
- Windows 2000 PRO/SERVER (fr) SP0
- Windows 2000 PRO/SERVER (fr) SP1
- Windows 2000 PRO/SERVER (fr) SP2
Best regards,
descript <descript@....cc>
s0h - Skin of humanity
http://s0h.cc
Powered by blists - more mailing lists