This is an interesting exploit. No client interaction is required. This exploits the print spooler on target systems by submitting a job into the schedule which then executes as SYSTEM. Microsoft ref MS10-061.
Monthly Archives: September 2010
The very latest Adobe Acrobat Reader 9.3.4 (as of today 10th September 2010) is vulnerable (plus earlier versions) to this cooltype sing exploit. No fix as yet.
There has been lots of recent press relating to DLL hijacking. I have tested this out and created a video demonstration to help clear this up as slightly confusing. This is a client side exploit so the user must browse the SMB share or the HTTP server. There is no so called patch from Microsoft […]
A nice little client side exploit here. Download the very latest Quicktime version from Apple.com 184.108.40.206 (3rd Sept 2010) and check for updates to ensure you have the latest version….It is fully exploitable!. Within Metasploit it creates a webserver that the client must browse to, once the client browses it exploits a vulnerability within Quicktime. […]