Posted by malvuln on Jan 12

Discovery / credits: malvuln – Malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/6c5081e9b65a52963b0b1ae612ef7eb4.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Zombam.a
Vulnerability: Remote Stack Buffer Overflow
Description: The malware listens on TCP port 80, sending an HTTP GET
request with 300 or more bytes will trigger buffer overflow
overwriting EIP.
Type: PE32
MD5:…
Read More – Full Disclosure


By |2021-01-13T04:18:54-05:00January 13th, 2021|