关联漏洞
Description
Windows: heap overflow in jscript.dll in Array.sort
介绍
# CVE-2017-11907
aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript
https://googleprojectzero.blogspot.jp/2017/12/apacolypse-now-exploiting-windows-10-in_18.html
Windows: heap overflow in jscript.dll in Array.sort
https://bugs.chromium.org/p/project-zero/issues/detail?id=1383
文件快照
[4.0K] /data/pocs/2c6dc37552644c209e6c92b91cbeb1d012c7966b
├── [4.0K] OxidResolver.NoStdLib.Compile.With.Sizeoptimized
│ ├── [4.0K] OxidResolver
│ │ ├── [ 15K] OxidResolver.cpp
│ │ ├── [ 11K] OxidResolver.vcxproj
│ │ ├── [1.5K] OxidResolver.vcxproj.filters
│ │ ├── [ 165] OxidResolver.vcxproj.user
│ │ ├── [ 23K] resolver_c.c
│ │ ├── [5.2K] resolver_h.h
│ │ ├── [3.1K] resolver.idl
│ │ ├── [ 19K] resolver_s.c
│ │ ├── [ 304] stdafx.cpp
│ │ ├── [ 327] stdafx.h
│ │ └── [ 314] targetver.h
│ ├── [1.8K] OxidResolver.sln
│ └── [ 59] README.md
├── [ 423] PoC_for_IE.js
├── [ 313] README.md
└── [ 66K] wpad.dat
2 directories, 16 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。