Buffer overflow in WebAdmin.exe for WebAdmin allows remote malicious users to execute arbitrary code via an HTTP request to WebAdmin.dll with a long USER argument.
##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below In the
# case of an unknown or missing license, this file defaults to the same
# license as the core Framework (dual GPLv2 and Artistic) The latest
# version of the Framework can always be obtained from metasp ...
source: wwwsecurityfocuscom/bid/8024/info
Alt-N WebAdmin is prone to a buffer overflow condition This is due to insufficient bounds checking on the USER parameter Successful exploitation could result in code execution with SYSTEM level privileges
/* WebAdmindll remote proof of concept 204 version tried finding 205 but all versi ...
source: wwwsecurityfocuscom/bid/8024/info
Alt-N WebAdmin is prone to a buffer overflow condition This is due to insufficient bounds checking on the USER parameter Successful exploitation could result in code execution with SYSTEM level privileges
/* WebAdmindll remote download exec shellcode Works on 203 and 204 all windows sp' ...
##
# $Id: altn_webadminrb 8498 2010-02-15 00:48:03Z hdm $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions Please see the Metasploit
# Framework web site for more information on licensing and terms of use
# metasploitcom/framework/
##
require 'msf/core'
class Me ...