Sunday, July 6, 2008

Safari + Quicktime <= 7.3 RTSP Content-Type Overflow Exploit

Safari + Quicktime <= 7.3 RTSP Content-Type overflow exploit for Mac OS X (Intel)

Tested with OS X 10.4.
On victim, browse to http://server:8080/
Binds shell on port 4444.

by krafty

greets to sk, halvar, grugq, and all the ethnical hackers
extra thanks to ddz for osx hackery
sec-con greets to secwest, blackhat, hitb, hacklu, itu, xcon, syscan, poc
sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders.
milw0rm and packetstorm rule
Bring back the days of technotronic and r00tshell! Freedom.

Why is this exploit called "Quickbite"? Here's a dumb Apple joke:
"What's worse than biting into an apple and finding a worm?"
"Finding half a worm".

http://www.milw0rm.com/exploits/6013

No comments:

Post a Comment