Monday, September 13, 2010

CVE-2010-2883 poc

I received this exploit from Mila

My tests
Windows VersionAdobe Reader Versionexploitable
xp8.1.1yes
vista8.1.1yes
win78.1.1yes
xp9.3.4yes
vista9.3.4yes
win79.3.4yes




Decoded JS (click on the picture to enlarge)




Shellcode

The shellcode is very interesting, it compatible for windows 7, drops dll and call function by address from dll.

It get functions by name

SearchMask is dword, where begin data of embeded dll in pdf

and at the end after put in %temp% dir hcp.dll ,
shellcode call loadlibraryA hcp.dll , then call function StartUp by it address 17a0h



to be continued ....

No comments:

Post a Comment