lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000001c343ec$3091cbf0$0100a8c0@ark> From: rikul at interbee.com (Rick) Subject: rundll32.exe buffer overflow Hi, There is buffer overflow in rundll32.exe when it is passed big string as routine name for a module. I've tested this on WindowsXP SP1. But other version of windows might be vuln. rundll32.exe advpack32.dll,<'A'x499> advpack32.dll is just example. Any executable/dll will work. The cmdline does get converted to UNICODE. And EIP ends up being 00410041. - Rick Patel -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030706/a54e97d3/attachment.html