This module exploits a vulnerability in the way WMF metafile images are handled by Microsoft Windows Graphics Rendering Engine.



In this new version, the generated metafile is much more random and fully compliant with the file format.



Additionally, the payload tries to escape to another process, then returns from the callback transferring the execution flow back to the host application, hiding exploitation from the user's perception.



Note that the exploit will be moved to the Exploits/Client Side category after applying this update.
This module exploits a vulnerability in Winamp 5.12



WARNING: This is an early release module.



This is not the final version of this module. It is a pre-released

version in order to deliver a module as quickly as possible to our

customers that may be useful in some situations. Since this module is

not the final version it may contain bugs or have limited functionality

and may not have complete or accurate documentation.

This update can be downloaded and installed by selecting 'Modules' ->

'Update modules' from IMPACT's main menu. A workspace must be opened for

the operation to succeed.
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string. This module exploits this vulnerability and installs an agent.
This module exploits a vulnerability in the way WMF metafile images are handled by Microsoft Window's graphic rendering engine.



WARNING: This is an early release module.



This is not the final version of this module. It is a pre-released

version in order to deliver a module as quickly as possible to our

customers that may be useful in some situations. Since this module is

not the final version it may contain bugs or have limited functionality

and may not have complete or accurate documentation.

This update can be downloaded and installed by selecting 'Modules' ->

'Update modules' from IMPACT's main menu. A workspace must be opened for

the operation to succeed.
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function. This module exploits this vulnerability and installs an agent.

This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install a Level0 agent by exploiting a vulnerability in the "devenum.dll" COM object when instantiated in Internet Explorer via a specially crafted HTML tag (MS05-038).