Safari + Quicktime <= 7.3 RTSP Content-Type overflow exploit for Mac OS X (Intel)
Tested with OS X 10.4.
On victim, browse to http://server:8080/
Binds shell on port 4444.
by krafty
greets to sk, halvar, grugq, and all the ethnical hackers
extra thanks to ddz for osx hackery
sec-con greets to secwest, blackhat, hitb, hacklu, itu, xcon, syscan, poc
sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders.
milw0rm and packetstorm rule
Bring back the days of technotronic and r00tshell! Freedom.
Why is this exploit called "Quickbite"? Here's a dumb Apple joke:
"What's worse than biting into an apple and finding a worm?"
"Finding half a worm".
http://www.milw0rm.com/exploits/6013
No comments:
Post a Comment