Description: In this video he shows us how to exploit a memory corruption flaw in Microsoft XML Core In this module Microsoft XML core trying to access an uninitialized node with get Definition API. So which may corrupt memory allowing remote code execution. At that movement exploit only target Microsoft XML Core Services 3.0 via IE6 and IE7 over XP SP3
For More Information About This Vulnerability Visit this sites :-
http://www.metasploit.com/modules/exploit/windows/browser/ms06_071_xml_core
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-5745
http://www.osvdb.org/29425
http://technet.microsoft.com/en-us/security/bulletin/ms06-071
http://www.securityfocus.com/bid/20915
http://www.exploit-db.com/exploits/19186/
Tags: microsoft , xml , exploit , service ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
is it applicable or window 7 ??
hey hackmaan .. Yes this vulnerability affected almost all windows OS. And he tested this vulnerability on windows xp. And This vulnerability affected 3.0, 4.0, 5.0, 6.0 XML core Services.