iSQL 1.0 Buffer Overflow
Posted on 13 June 2016
#!/bin/ruby # Exploit Title: iSQL(RL) 1.0 - Buffer Overflow(isql_main.c) # Date: 2016-06-13 # Exploit Author: HaHwul # Exploit Author Blog: www.hahwul.com # Vendor Homepage: https://github.com/roselone/iSQL # Software Link: https://github.com/roselone/iSQL/archive/master.zip # Version: 1.0 # Tested on: Debian [wheezy] # CVE : none =begin ### Vulnerability Point :: [isql_main.c 453 line] strcpy((char *)cmd+5,str); code is vulnerable :: don't check str size 446 char *get_MD5(char *str){ 447 FILE *stream; 448 char *buf=malloc(sizeof(char)*33); 449 char cmd[100]; 450 memset(buf,'