12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 5-7: User-controlled argument of NewObject() after defining a new breakpointStep 5: Reverse Engineer the Object MethodsTo recap, I found an obvious vulnerability that happens while theActiveX control processes the user-supplied string value that getspassed to NewObject(). Figure 5-8 illustrates the code path to reachthe vulnerable function.Figure 5-8: Code path to reach the vulnerable function (created in IDA Pro)Browse and You’re Owned 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!