Skip navigation

Buffer Overflow in Windows XP SP1's rundll32.exe

Reported July 6, 2003, by Rick Patel.

 

 

VERSIONS AFFECTED

 

  • Windows XP SP1

 

DESCRIPTION

 

·         A buffer-overflow vulnerability exists in Windows XP Service Pack 1's (SP1's) rundll32.exe file.
 

DEMONSTRATION

 

The discoverer posted the following example as proof of concept:

 

rundll32.exe  advpack32.dll,<’A’x499>  

 

The advpack32.dll file is only an example. Any executable or DLL will work. The command line is converted to UNICODE. And EIP (Execution Instruction Point) ends up being 00410041.

 

VENDOR RESPONSE

 

Microsoft hasn't yet responded to this problem.

 

CREDIT                                                                                                       
Discovered by Rick Patel.

TAGS: Security
Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish