[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ntbugtraq
Subject:    Win32hlp exploit for : ":LINK overflow"
From:       descript <descript () SV98 ! S0H ! CC>
Date:       2003-03-09 0:45:43
[Download RAW message or body]

hi list,

In date Sunday, 9 March, 2003 1:00 AM s0h released an exploit : Win32hlp exploit for \
: ":LINK overflow"

Source : http://s0h.cc/exploit/s0h_Win32hlp.c
Binary : http://s0h.cc/exploit/s0h_Win32hlp.exe

Discovered by ThreaT <threat@s0h.cc>.
Coded by ThreaT <threat@s0h.cc>
Hompage : http://s0h.cc/~threat/

This exploit can trap a .CNT file (file with .HLP files) with the arbitrary code who \
can download and execute a trojan without user ask.

This exploit was tested on :
        - Windows 2000 PRO/SERVER (fr) SP0
        - Windows 2000 PRO/SERVER (fr) SP1
        - Windows 2000 PRO/SERVER (fr) SP2


Best regards,
descript <descript@s0h.cc>
s0h - Skin of humanity
http://s0h.cc

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
Have you discovered a security vulnerability related to Windows or a
commercial product which runs on Windows?

Need assistance crafting the format or translating your advisory to English?

Need to verify it, or having problems contacting the Vendor?

Contact mailto:Advisories@NTBugtraq.com

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic