[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Working GDI+ JPEG exploit code?
- To: <full-disclosure@xxxxxxxxxxxxxxxx>
- Subject: [Full-Disclosure] Working GDI+ JPEG exploit code?
- From: "Keifer, Trey" <Trey.Keifer@xxxxxxxxxxxxxxxxxxx>
- Date: Thu, 21 Oct 2004 10:50:38 -0500
I have been testing the code on k-otik's site for the last 3 days and have been
unable to get the
reverse shell technique working. My test environment consists of a winxp sp1
machine in a vmware
session and a fully patched winxp sp2 host machine. The code reliably crashes
explorer when a
directory with a malicious jpeg is browsed, but my netcat listener on the host
never picks up
anything.
My thoughts now are that because the exploit is heap based, its never jumping
to a point anywhere in
the NOP sleds and thus, never finding my shellcode. I ran it through ollydbg
and see that EDX contains
my SC, but EIP is not under our control so we have no way to point to it.
This is my first real in-depth analysis, so go easy...
---
Trey Keifer
Security Engineer - Level II
Fishnet Security
Direct: 816.701.2073
Main: 816.421.6611
Toll Free: 888.732.9406
Fax: 816.474.0394
http://www.fishnetsecurity.com
The information transmitted in this e-mail is intended only for the addressee
and may contain confidential and/or privileged material.
Any interception, review, retransmission, dissemination, or other use of, or
taking of any action upon this information by persons or entities
other than the intended recipient is prohibited by law and may subject them to
criminal or civil liability. If you received this communication
in error, please contact us immediately at 816.421.6611, and delete the
communication from any computer or network system.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html