header-logo
Suggest Exploit
vendor:
Windows XP Professional
by:
Ac!dDrop
7.8
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Windows XP Professional
Affected Version From: Windows XP Professional SP1
Affected Version To: Windows XP Professional SP2
Patch Exists: YES
Related CWE: MS08-021
CPE: o:microsoft:windows_xp
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Professional
2008

EMR_COLORMATCHTOTARGETW stack buffer overflow exploit

This is one of the 2 Vulnerabilities of MS08-021. Tested on Windows xp professional SP1, GDi32.dll 5.1.2600.1106, kernel32.dll 5.1.2600.1106, ws2_32.dll 5.1.2600.0. calc.zip executes calculator, IE.zip and localhost.zip connects at localhost at port 230. On Windows Xp Sp2 only causes Denial of service. Vulnerable function guarded with a GS cookie. The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page.

Mitigation:

Install the latest security updates and patches for the affected software.
Source

Exploit-DB raw data:

EMR_COLORMATCHTOTARGETW stack buffer overflow exploit
By Ac!dDrop

This is one of the 2 Vulnerabilities of MS08-021

Tested on Windows xp professional SP1
GDi32.dll    5.1.2600.1106
kernel32.dll 5.1.2600.1106
ws2_32.dll   5.1.2600.0

calc.zip---> executes calculator
IE.zip and localhost.zip ------>  connects at localhost at port 230


On Windows Xp Sp2 only causes Denial of service.
 -(Vulnerable function guarded with a GS cookie)
 -(The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page ).

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6656.tgz (2008-Gdi.tgz)

# milw0rm.com [2008-10-02]