[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MS Windows Animated Cursor (.ANI) Remote Exploit (eeye patch bypass)

Author
jamikazu
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8892
Category
remote exploits
Date add
31-03-2007
Platform
unsorted
====================================================================
MS Windows Animated Cursor (.ANI) Remote Exploit (eeye patch bypass)
====================================================================

Windows Animated Cursor Handling Exploit (0day) (Version3)

Works on fully patched Windows Vista
I think it is first real remote code execution exploit on vista =)

Tested on:
Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled)
Windows XP SP2 
(It also must to work on all nt based windows but not tested)

Update: It also bypass eeye security ani patch!

Author: jamikazu 
Mail: jamikazu@gmail.com

Bug discovered by determina (http://www.determina.com)

Credit: milw0rm,metasploit, SkyLined, http://doctus.net/

invokes calc.exe if successful 

http://www.inj3ct0r.com/sploits/8892.zip




#  0day.today [2024-12-25]  #