Metasploit mailing list archives

adobe


From: w3bd3vil at gmail.com (webDEViL)
Date: Wed, 18 Mar 2009 02:51:19 +0530

Assigning 800mb wouldn't make the exploit work any better.
After my analysis, "I" do not think that this can be exploited reliably.
I believe the analysis you posted as well states the same thing. :)

Regards,
webDEViL

On Wed, Mar 18, 2009 at 1:04 AM, Nicolas Krassas <krasn at ans.gr> wrote:

 rogue, here are some more links maybe you will find something in there

http://rootof.info/800mb.pdf this one should open calc.exe and use ... 800
mb from the memory , was this also
http://securitylabs.websense.com/content/Blogs/3311.aspx mentioned earlier
?

Also the current exploit is downloading a file from
http://202.67.215.110/caonimabi.exe

according to
http://blog.didierstevens.com/2009/03/04/quickpost-jbig2decode-trigger-trio/ and
finally


http://www.secureworks.com/research/blog/index.php/2009/3/10/analysis-of-cve-2009-0658-adobe-reader-0day/ for
a detailed approach.

Sorry for double links ... bad habbit of deleting e-mails and then replying


Dinos

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090318/3301dec8/attachment.htm>


Current thread: