[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <fe861641003170720n2fe335eajda79e6cf07eaf8f5@mail.gmail.com>
Date: Wed, 17 Mar 2010 19:50:07 +0530
From: sachin shinde <sachinshinde11@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Wordpad Command line argument vulnerability is it
known ?
hi,
There is classic buffer/Stack overflow in wordpad.exe testing on winxp
sp 2.(is it already known?)
on text console wordpad.exe takes argument as a filename and there it happens.
but writing shellcode for it is very hard,Because wordpad changes
uppercase chars to lower case chars. if anyone any idea about this
please reply!
Though it looks like local vulnerability we can trigger it remotely
with ActiveX and Javascript.I can give full demonstration but cant
write shellcode because of too many bad characters( of course can show
you int 3 (0xcc)) but would like 2 show the full proof of concept
demonstration.
Regards,
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists