본문 바로가기
IT 보안소식

PacketStorm, "DLL Hijacking Exploit" 취약 프로그램 목록

by 잡다한 처리 2010. 8. 26.
반응형

이번 윈도우즈 Dll 하이잭킹 취약점에 노출 된 프로그램 목록들이다.
계속적으로 추가 될 예정

참고) Exploit Code를 보려면 "File Name"의 txt파일을 Shift를 누루고 클릭
Taget=_Blank 를 일일히 수정하기 어려워서 패스하였음 ㅋㅋ


 ///  File Name: wireshark-dllhijack.txt
Description:
Wireshark versions 1.2.10 and below DLL Hijacking Exploit that leverages airpcap.dll.
Author: TheLeader
MD5 Checksum: 58b63cafdc1ee57a10edd4a847ea7758

 ///  File Name: mspp-dllhijack.txt
Description:
Microsoft Power Point 2010 DLL Hijacking Exploit.
Author: TheLeader
MD5 Checksum: 1a176c3d232969c21bb3e988c4d4fcfb

 ///  File Name: utorrent-dllhijack.txt
Description:
uTorrent versions 2.0.3 and below DLL Hijacking Exploit that leverages plugin_dll.dll.
Author: TheLeader
MD5 Checksum: 92bdd8e8814dfb17f9e6415f0882fb39

 ///  File Name: windowsliveemail-dllhijack.txt
Description:
Windows Live Email DLL Hijacking Exploit.
Author: Nicolas Krassas
MD5 Checksum: c04bcf794abbcd6581cd0dd29dd3c889

 ///  File Name: firefox368-dllhijack.txt
Description:
Firefox versions 3.6.8 and below DLL Hijacking Exploit.
Author: Glafkos Charalambous
MD5 Checksum: 2d42aa1ebdb9e6c9910c4421ad3242b6

 ///  File Name: mswinmm-dllhijack.txt
Description:
Microsoft Windows Movie Maker versions 2.6.4038.0 and below DLL Hijacking Exploit.
Author: TheLeader
MD5 Checksum: b656e574f6c4a45724a9055c2d316aee

 ///  File Name: opera-dllhijack.txt
Description:
Opera version 10.61 DLL Hijacking Exploit.
Author: Nicolas Krassas
MD5 Checksum: c7781b8082da01c615bf243a79e58a0c

 ///  File Name: ms7wab-dllhijack.txt
Description:
Microsoft Windows 7 wab.exe DLL Hijacking Exploit that leverages wab32res.dll.
Author: TheLeader
MD5 Checksum: 0c0fe251d69439f5d3b99eaf570ba57e

 ///  File Name: teamviewer-dllhijack.txt
Description:
TeamViewer versions 5.0.8703 and below DLL Hijacking Exploit that leverages dwmapi.dll.
Author: Glafkos Charalambous
MD5 Checksum: 51369ef60815fda1c43e550b4c361e02

 ///  File Name: adobedwcs4-dllhijack.txt
Description:
Adobe Dreamweaver CS4 DLL Hijacking Exploit that leverages ibfs32.dll.
Author: Glafkos Charalambous
MD5 Checksum: 788ad8e3791e065dc4d719518203d056

 ///  File Name: bsplayer-dllhijack.txt
Description:
BS.Player versions 2.56 build 1043 and below DLL Hijacking Exploit that leverages mfc71loc.dll.
Author: Bruno Filipe
MD5 Checksum: 77ee260d604f0e6ca0a6a9dcedee86b3

 ///  File Name: adobedwcs5-dllhijack.txt
Description:
Adobe Dreamweaver CS5 DLL Hijacking Exploit that leverages mfc901oc.dll.
Author: Bruno Filipe
MD5 Checksum: af38c2a6954c68f5e17103a4965499f3

 ///  File Name: adobepscs2-dllhijack.txt
Description:
Adobe Photoshop CS2 DLL Hijacking Exploit that leverages Wintab32.dll.
Author: storm
MD5 Checksum: a7057341ea7c373b33ce7e2ec3783963

 ///  File Name: avastlf-dllhijack.txt
Description:
Avast! versions 5.0.594 and below license files DLL Hijacking Exploit.
Author: Bruno Filipe
MD5 Checksum: 5d51ceef3701ff8fc05f973e3330a47b

 ///  File Name: utorrent-dllhijack.tgz
Description:
uTorrent versions 2.0.3 and below DLL Hijacking Exploit.
Author: Dr_IDE
MD5 Checksum: 9bb45bcef8659961825686d5c32cb10b

 ///  File Name: acunetix-dllhijack.txt
Description:
Acunetix Web Vulnerability Scanner version 6.5.20100616 DLL Hijacking Exploit.
Author: Kolor
MD5 Checksum: 85558ddd9630f9ff7dd64bc80a62fec4

 ///  File Name: vlcmp-dllhijack.txt
Description:
VLC Media Player DLL Hijacking Exploit.
Author: Secfence
MD5 Checksum: 563753117ffc4da2f390a15588f0f5f7

 ///  File Name: intervideo-dllhijack.txt
Description:
InterVideo WinDVD 5 DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 09de1e198297652fc1e7c07278aef804

 ///  File Name: msicsw-dllhijack.txt
Description:
Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 5943935ccff44312c2f5be840c83d8e3

 ///  File Name: opera_dll_hijacking.c
Description:
Opera versions 10.61 and below DLL Hijacking Exploit.
Author: Glafkos Charalambous
MD5 Checksum: b1e637d77f7111069ca815ed5f9e700d

 ///  File Name: safari501-dllhijack.txt
Description:
Safari version 5.0.1 DLL Hijacking Exploit.
Author: Secfence
MD5 Checksum: 0627a5b4e9a45a897a3a88e4e240e195

 ///  File Name: msvisio-dllhijack.tgz
Description:
Microsoft Visio 2003 DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 9e27e04ec9fee180d246dc06ef009500

 ///  File Name: msab-dllhijack.tgz
Description:
Microsoft Address Book DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: ecc6068dd5a2c7c0a98c0a324f19d955

 ///  File Name: msog-dllhijack.tgz
Description:
Microsoft Office Groove 2007 DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: d14dd1c29e98d997cc7a27493c60c037

 ///  File Name: teammate-dllhijack.tgz
Description:
TeamMate Audit Management Software Suite DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 678e20b4ac39f58293d5d28673a3b65b

///  File Name: teammate-dllhijack.tgz
Description:
TeamMate Audit Management Software Suite DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 678e20b4ac39f58293d5d28673a3b65b

 ///  File Name: msgc-dllhijack.tgz
Description:
Microsoft Group Convertor DLL Hijacking Exploit that leverages imm.dll.
Author: Beenu Arora
MD5 Checksum: a300e1f39ea29cf1fc42cfd6c8163544

 ///  File Name: snagit-dllhijack.tgz
Description:
TechSmith Snagit version 10 build 788 DLL Hijacking Exploit that leverages dwmapi.dll.
Author: Encrypt3d.M!nd
MD5 Checksum: b87e90f950b981006d9b0239f6e8d090

 ///  File Name: roxiocreator-dllhijack.txt
Description:
Roxio Creator DE DLL Hijacking Exploit.
Author: storm
MD5 Checksum: a1bb312599e57365d9a71bd98a3ba2ba

 ///  File Name: mswc-dllhijack.txt
Description:
Microsoft Windows Contacts DLL Hijacking Exploit.
Author: storm
MD5 Checksum: 249c9e952d1def4a72679ac54ef3c7a4

 ///  File Name: roxiomydvd-dllhijack.txt
Description:
Roxio MyDVD 9 DLL Hijacking Exploit that leverages HomeUtils9.dll.
Author: storm
MD5 Checksum: f82848130f0b2d13d6feb9f21f37eafc

 ///  File Name: msopp-dllhijack.txt
Description:
Microsoft Office PowerPoint 2007 DLL Hijacking Exploit.
Author: storm
MD5 Checksum: 80a15c181373a6962fe586d8976b958b

 ///  File Name: adobe_device_central_cs5.c
Description:
Adobe Device Central CS5 DLL Hijacking Exploit that leverages qtcf.dll.
Author: Glafkos Charalambous
MD5 Checksum: 65c8444e57651570516d753817021baf

 ///  File Name: wscript-dllhijack.txt
Description:
wscript.exe DLL Hijacking Exploit that leverages wshfra.dll.
Author: Mohamed Clay
MD5 Checksum: 03a3e87341ae96e989983fb1e1970d1c

 ///  File Name: putty-dllhijack.txt
Description:
PuTTY version 0.60 DLL Hijacking Exploit.
Author: storm
MD5 Checksum: 71bc7ed3b3420f3a61daacadca111795

 ///  File Name: mswpg-dllhijack.txt
Description:
Windows Program Group DLL Hijacking Exploit that leverages imm.dll.
Author: Alvaro Ovalle
MD5 Checksum: 39b6f66f6a5a098949c5b2f5d3bc1497

 ///  File Name: nvidia-dllhijack.txt
Description:
Nvidia Driver DLL Hijacking Exploit.
Author: Encrypt3d.M!nd
MD5 Checksum: 3bf29bf9afba4923d98ffec9506cc892

 ///  File Name: skype.c
Description:
Skype versions 4.2.0.169 and below DLL Hijacking Exploit that leverages wab32.dll.
Author: Glafkos Charalambous
MD5 Checksum: 02256250781ec437d556a79155264cd5

 ///  File Name: adobe_illustrator_cs4.c
Description:
Adobe Illustrator CS4 DLL Hijacking Exploit that leverages aires.dll.
Author: Glafkos Charalambous
MD5 Checksum: dc0504fea6af189b950538e604be4739

 ///  File Name: adobe_indesign_cs4.c
Description:
Adobe InDesign CS4 DLL Hijacking Exploit that leverages ibfs32.dll.
Author: Glafkos Charalambous
MD5 Checksum: 5447e8ef5077f1911414358324a0ac67

 ///  File Name: adobe_on_location.c
Description:
Adobe On Location CS4 DLL Hijacking Exploit that leverages ibfs32.dll.
Author: Glafkos Charalambous
MD5 Checksum: 50df7f324c9631a89642f6a79fd19f11

 ///  File Name: adobe_premier_pro_cs4.c
Description:
Adobe Premier Pro CS4 DLL Hijacking Exploit that leverages ibfs32.dll.
Author: Glafkos Charalambous
MD5 Checksum: 0fa2a394ea5b55e751b2ff0e64749f17

 ///  File Name: demontoollite-dllhijack.txt
Description:
Demon Tool Lite DLL Hijacking Exploit that leverages mfc80loc.dll.
Author: Mohamed Clay
MD5 Checksum: 370a6f2ed9caa0df87c7b05d38338c95

 ///  File Name: mediaplayerclassic-dllhijack.txt
Description:
Media Player Classic version 1.3.2189.0 DLL Hijacking Exploit that leverages iacenc.dll.
Author: Encrypt3d.M!nd
MD5 Checksum: c893054d3598aeeeaddcd671d9b3f3b3

 ///  File Name: autodeskautocad-dllhijack.txt
Description:
Autodesk AutoCAD 2007 DLL Hijacking Exploit.
Author: xsploited Security
MD5 Checksum: 78f18915bd3fc8d7733a3b4827071565

 ///  File Name: windowsics-dllhijack.txt
Description:
Windows Internet Communication Settings DLL Hijacking Exploit that leverages schannel.dll.
Author: ALPdaemon
MD5 Checksum: a7241f896e4ffbaacf99af9e77ea430c

 ///  File Name: ettercap-dllhijack.txt
Description:
Ettercap NG version 0.7.3 DLL Hijacking Exploit that leverages wpcap.dll.
Author: Teo Manojlovic
MD5 Checksum: 6b21ae026e4cd50599fd13fd91414079

 ///  File Name: bitlocker-dllhijack.tgz
Description:
Microsoft Vista BitLocker Drive Encryption API Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 7679032b85ba1d0307ce5832f0d8480f

 ///  File Name: roxiops-dllhijack.tgz
Description:
Roxio Photosuite 9 DLL Hijacking Exploit.
Author: Beenu Arora
MD5 Checksum: 156a3da00818d31b5b39978465e74ac7

 ///  File Name: adobedc_dll.txt
Description:
Adobe Device Central CS5 version 3.0.1.0 DLL Hijacking Exploit that leverages dwmapi.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 8f61acc78495113542ec46bf712816f0

//  File Name: adobeem_dll.txt
Description:
Adobe Extension Manager CS5 version 5.0.298 DLL Hijacking Exploit that leverages dwmapi.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 74c372017c093e26006aa12b9ab7654d

 ///  File Name: adobeest_dll.txt
Description:
Adobe ExtendedScript Toolkit CS5 version 3.5.0.52 DLL Hijacking Exploit that leverages dwmapi.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 7b81f1aa5169bde5a20145ec71804d3f

 ///  File Name: coreldrw_dll.txt
Description:
CorelDRAW X3 version 13.0.0.576 DLL Hijacking Exploit that leverages crlrib.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: e7f0f077c85d5a1c5147d497a6a2d764

 ///  File Name: Adobe-rdr9-dll-hijack.cpp
Description:
Adobe Reader 9 DLL Hijacking Exploit that leverages sqlite.dll.
Author: xsploited Security
MD5 Checksum: fb62371cd83a5a42461c53f81003fe06

 ///  File Name: ciscopackettracer-dllhijack.txt
Description:
Cisco Packet Tracer version 5.2 DLL Hijacking Exploit that leverages wintab32.dll.
Author: CCNA
MD5 Checksum: 1434735d3a31aa73dd1217e119be3a49

 ///  File Name: thunderbird-dllhijack.txt
Description:
Mozilla Thunderbird version 3.1.2 DLL Hijacking Exploit that leverages dwmapi.dll.
Author: h4ck3r#47
MD5 Checksum: 33c569644f7093a8017194afc84e9ffe

 ///  File Name: corelpp_dll.txt
Description:
Corel PHOTO-PAINT X3 version 13.0.0.576 DLL Hijacking Exploit that leverages crlrib.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 4e105a1cda037b305a27801d3e7d61dc

 ///  File Name: mplayerc_dll.txt
Description:
Media Player Classic version 6.4.9.1 DLL Hijacking Exploit that leverages iacenc.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 9375a1adfd717f53e2832cdd892e3db0

 ///  File Name: mspowerp_dll.txt
Description:
Microsoft Office PowerPoint 2007 version 12.0.4518 DLL Hijacking Exploit that leverages pp4x322.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 11bfa4e4ee5e432098464b0ff11324be

 ///  File Name: winamp_dll.txt
Description:
Nullsoft Winamp version 5.581 DLL Hijacking Exploit that leverages wnaspi32.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 9683aecf71f52839df66101d92b394ba

 ///  File Name: googlee_dll.txt
Description:
Google Earth version 5.1.3535.3218 DLL Hijacking Exploit that leverages quserex.dll.
Author: LiquidWorm
Homepage: http://www.zeroscience.mk/
MD5 Checksum: 6fbd052731b9bbd40eba76c70dd87773







댓글