vendor:
Internet Explorer
by:
Ahmed Obied
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Internet Explorer
Affected Version From: Internet Explorer 7.0.5730.11
Affected Version To: Internet Explorer 7.0.5730.11
Patch Exists: YES
Related CWE: CVE-2009-0075
CPE: a:microsoft:internet_explorer:7.0.5730.11
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=35630, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/browser/ms09_002_memory_corruption, https://www.infosecmatter.com/nessus-plugin-library/?id=58325, https://www.infosecmatter.com/nessus-plugin-library/?id=63402, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=108808, https://www.infosecmatter.com/nessus-plugin-library/?id=53617
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2
2009
MS09-002 Exploit
This exploit is based on the code found by str0ke in the wild for MS09-002. It is tested using Internet Explorer 7.0.5730.11 on Windows XP SP2. The exploit uses a win32_exec payload to execute a calc.exe command. It uses a heap spray technique to spray the heap with the payload and execute it.
Mitigation:
Microsoft has released a patch for this vulnerability.