10
CVSSv2

CVE-2008-1914

Published: 22/04/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the AntServer module (AntServer.exe) in BigAnt IM Server in BigAnt Messenger 2.2 allows remote malicious users to execute arbitrary code via a long URI in a request to TCP port 6080. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

bigantsoft bigant messenger 2.2

Exploits

#!/usr/bin/python ############################################################################### # BigAnt Server Ver 22 PreAuth Remote SEH Overflow (0day) # Matteo Memelli aka ryujin # wwwbe4mindcom - wwwgray-worldnet # 04/13/2008 # Tested on Windows 2000 Sp4 English # Vulnerable process is AntServerexe # Offset for SEH overwrite is 954 Byt ...
#!/usr/bin/python # BigAnt Server version 250 SEH Overwrite - 0day # Written and discovered by Blake # Tested on Windows XP SP3 # # $ /bigantpy 1921681131 6660 # # [*] BigAnt Server v250 SEH Overwrite 0day # [*] Written and discovered by Blake # [*] Tested on Windows XP SP3 # # [+] Connecting to 1921681131 on port 6660 # [+] Sending payl ...
## # $Id: bigant_serverrb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Me ...
#!/usr/bin/python # by hack4love # BigAnt Server version 250 SEH Overwrite Universal # discovered by Blake wwwmilw0rmcom/exploits/9673 # Tested on Windows XP SP2 # gratez to Blake # use >> bigantpy 192168112 6660 import socket, sys if len(sysargv)!= 3: print "\n[*] Usage: %s <ip> <port>\n" % sysargv[0] sysexit( ...
## # $Id: bigant_server_250rb 9669 2010-07-03 03:13:45Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' clas ...