[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20041225022705.0CE2C19C70@xfocus.org>
Date: Sat, 25 Dec 2004 10:19:59 +0800
From: "flashsky" <flashsky@...cus.org>
To: Brett Glass <brett@...iat.org>
Cc: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>,
"full-disclosure@...ts.netsys.com" <full-disclosure@...ts.netsys.com>
Subject: Re: Re: Microsoft Windows LoadImage API Integer
Buffer overflow
This vul can be exploited, at http://www.xfocus.net/flashsky/icoExp/index.html ,i give a test exp(open 28876 port) for windows xp sp1, but it need html sctipt run and allocate memory.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists