Metasploit mailing list archives
adobe
From: krasn at ans.gr (Nicolas Krassas)
Date: Tue, 17 Mar 2009 21:34:07 +0200
rogue, here are some more links maybe you will find something in there http://rootof.info/800mb.pdf this one should open calc.exe and use ... 800 mb from the memory , was this also http://securitylabs.websense.com/content/Blogs/3311.aspx mentioned earlier ? Also the current exploit is downloading a file from http://202.67.215.110/caonimabi.exe according to http://blog.didierstevens.com/2009/03/04/quickpost-jbig2decode-trigger-trio/ and finally http://www.secureworks.com/research/blog/index.php/2009/3/10/analysis-of-cve-2009-0658-adobe-reader-0day/ for a detailed approach. Sorry for double links ... bad habbit of deleting e-mails and then replying Dinos -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090317/fc9958ed/attachment.htm>
Current thread:
- typo3 sa-2009-002 metasploit auxiliary spinbad (Mar 14)
- typo3 sa-2009-002 metasploit auxiliary H D Moore (Mar 14)
- adobe Nicolas Krassas (Mar 17)
- adobe webDEViL (Mar 17)