Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added module for CVE-2012-0284 #646

Merged
merged 2 commits into from Jul 26, 2012
Merged

Added module for CVE-2012-0284 #646

merged 2 commits into from Jul 26, 2012

Conversation

jvazquez-r7
Copy link
Contributor

Tested successfully on:

  • Windows XP SP3: ie6, ie7, ie8 (dep bypass)
  • Windows Vista SP2: ie7

On Windows XP SP3 / IE8, heap spray has been avoided because it is stackpivoting to the stack, where the rop chain is stored, so payload has been stored in the stack too. A fresh install of IE8 has been used to exploit. Note that other plugins and/or activex's could do the vulnerable ActiveX to rebase, which would do the exploit to fail. As a sample, while testing, if flashplayer plugin is loaded before the vulnerable activex, the last one is rebased and exploit fails.

@wchen-r7 wchen-r7 merged commit 0bbcac9 into rapid7:master Jul 26, 2012
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants