Encountered crashes in the Windows Uniscribe user-mode library while trying to display text using a corrupted font file. The crashes occur in functions directly or indirectly called by USP10!BuildFSM.
This exploit allows non-administrator users to use the WinPcap device driver, potentially leading to network traffic sniffing and kernel mode code execution. The exploit code is a proof of concept (PoC) and has been tested on Windows XP SP2, but with minor modifications, it should work on other affected operating systems.
The crash occurs in the USP10!AssignGlyphTypes function of the Windows Uniscribe user-mode library. It is triggered when attempting to display text using a corrupted font file.
The crash occurs in the usp10!otlChainRuleSetTable::rule function while trying to display text using a corrupted TTF font file.
This exploit allows an attacker to change the user password remotely on the avtutorial portal. It requires the target server (ip/hostname), path to the folder, and the user ID (Admin/User) as input. The exploit supports specifying a different port or using a proxy for the attack.
Cobbler is a Linux installation server that allows for rapid setup of network installation environments. It glues together and automates many associated Linux tasks so you do not have to hop between many various commands and applications when deploying new systems, and, in some cases, changing existing ones. Cobbler can help with provisioning, managing DNS and DHCP, package updates, power management, configuration management orchestration, and much more.
I noticed that some javascript getters behave strangely.My test code:var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"];var f = document.createElement("iframe");f.onload = () => { f.onload = null; for (var x in window) { if (whitelist.indexOf(x) != -1) continue; try { window.__lookupGetter__(x).call(f.contentWindow); log(x); } catch (e) { } }};f.src = "https://abc.xyz/";document.body.appendChild(f);And after some plays, finally reached an UAF condition. PoC is attached. RIP will jump into the freed JIT code.Tested on Microsoft Edge 38.14393.0.0.
This is an advanced exploitation in exec-shield (Fedora Core case study) for the Apache Tomcat Connector (mod_jk). The exploit allows for remote overflow. The URL for reference is http://x82.inetcop.org/h0me/papers/FC_exploit/FC_exploit.txt
An integer overflow error within the 'LoadUvsTable()' function of usp10.dll can be exploited to cause a heap-based buffer overflow.
There is a heap overflow in AVC header slicing. To reproduce the issue, put the attached files on a server and visit http://127.0.0.1/LoadImage.swf?img=slice.flv