[prev in list] [next in list] [prev in thread] [next in thread]
List: ntbugtraq
Subject: Win32hlp exploit for : ":LINK overflow"
From: descript <descript () SV98 ! S0H ! CC>
Date: 2003-03-09 0:45:43
[Download RAW message or body]
hi list,
In date Sunday, 9 March, 2003 1:00 AM s0h released an exploit : Win32hlp exploit for \
: ":LINK overflow"
Source : http://s0h.cc/exploit/s0h_Win32hlp.c
Binary : http://s0h.cc/exploit/s0h_Win32hlp.exe
Discovered by ThreaT <threat@s0h.cc>.
Coded by ThreaT <threat@s0h.cc>
Hompage : http://s0h.cc/~threat/
This exploit can trap a .CNT file (file with .HLP files) with the arbitrary code who \
can download and execute a trojan without user ask.
This exploit was tested on :
- Windows 2000 PRO/SERVER (fr) SP0
- Windows 2000 PRO/SERVER (fr) SP1
- Windows 2000 PRO/SERVER (fr) SP2
Best regards,
descript <descript@s0h.cc>
s0h - Skin of humanity
http://s0h.cc
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
Have you discovered a security vulnerability related to Windows or a
commercial product which runs on Windows?
Need assistance crafting the format or translating your advisory to English?
Need to verify it, or having problems contacting the Vendor?
Contact mailto:Advisories@NTBugtraq.com
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic