lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2DFBD503BF11D140AAA56A1044FCFB8613DAB1FC@Pmal-na1.ghi.com>
From: OGoencz at ghi.com (Goencz, Otto)
Subject: Windows (XP SP2) Remote code execution with
	parameters

On my box, WinXP with SP2, the PoC worked as described...

-----Original Message-----
From: ShredderSub7 SecExpert [mailto:shreddersub7@...mail.com] 
Sent: Monday, December 27, 2004 7:24 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Windows (XP SP2) Remote code execution with
parameters

PoC (called CMDExe): http://www.freewebs.com/shreddersub7/htm.htm
Discussion: http://www.freewebs.com/shreddersub7/expl-discuss.htm

------------------Which systems are vulnerable?--------
Any system running any Microsoft Windows XP edition with Internet Explorer 6

or higher, even with SP2 applied.
Any system running any Microsoft Windows Server 2003 edition with Internet 
Explorer 6 or higher.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041228/ca8542c0/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ