Description: in this video we will see how we can exploit ms12-020 to kill a windows server 2008 R2 data center and inspect the traffic with wireshark
Tags: server-2008 , exploit , metasploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
This MS12-022 vulnerability name is Expression DesignThe. could allow remote code execution if a user opens a legitimate file such as an .xpr or .DESIGN file that is located in the same network directory as a specially crafted dynamic link library DLLfile.
originally discovered and reported by Luigi Auriemma. The flaw can be found in the way the T.125 ConnectMCSPDU packet is handled in the maxChannelIDs field, which will result an invalid pointer being used, therefore causing a denial-of-service condition. some interesting things regarding this is available on
http://www.securitytube.net/video/3130