Monday, March 12, 2007

MS Internet Explorer (FTP Server Response) DoS Exploit (MS07-016)

# MS 07-016 FTP Server Response PoC
# Usage: ./ms07016ftp.pl [LISTEN_IP]
#
# Tested Against: MSIE 6.02900.2180 (SP2)
#
# Details: The response is broken into buffers, either at length 1024,
# or at '\r\n'. Each buffer is apended with \x00, without
# bounds checking. If the response is exctly 1024 characters
# in length, you will overflow the heap with the string \x00.

http://www.milw0rm.com/exploits/3444

MS07-016: Cumulative security update for Internet Explorer

No comments:

Post a Comment