Asx to MP3本地代码执行漏洞
Tags
Common Information
Type Value
UUID d337684e-24a9-4364-baef-e17d33550a7d
Fingerprint cbcadc6f784131fc
Analysis status DONE
Considered CTI value 0
Text language
Published Nov. 4, 2016, midnight
Added to db Jan. 19, 2023, 12:06 a.m.
Last updated Nov. 17, 2024, 5:57 p.m.
Headline 2022-10-18update:原分析文章存在较大错误,正确的分析请参考https://bbs.pediy.com/thread-274763.htm,我这篇错误的分析我作为反面教材仍然保留在下文,读者感兴趣可以通过两篇文章对比发现初学二进制时可能发生的一些误区,再次感谢大家,同时对我错误的分析表示道歉。
Title Asx to MP3本地代码执行漏洞
Detected Hints/Tags/Attributes 14/0/9
Source URLs
Attributes
Details Type #Events CTI Value
Details Domain 132
www.exploit-db.com
Details File 1
thread-274763.htm
Details File 1
b31a84e79d9941d89336b6708ef52a20-asxtomp3converter_3121.exe
Details File 11
c:\windows\system32\user32.dll
Details File 2
c:\windows\system32\mfc42.dll
Details File 6
c:\windows\system32\msvcrt.dll
Details md5 1
b31a84e79d9941d89336b6708ef52a20
Details Url 1
https://bbs.pediy.com/thread-274763.htm
Details Url 1
https://www.exploit-db.com/apps/b31a84e79d9941d89336b6708ef52a20-asxtomp3converter_3121.exe