Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-4407 PoC — 多款Apple产品 Kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:多款Apple产品 Kernel 缓冲区错误漏洞 (CVE-2018-4407)
Description:Apple macOS High Sierra等都是美国苹果(Apple)公司的一套专为Mac计算机所开发的专用操作系统。 Apple macOS Sierra 10.12.6版本和macOS High Sierra 10.13.6版本中的Kernel组件存在安全漏洞。攻击者可利用该漏洞执行任意代码(内存损坏)。
Description
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Readme
# CVE-2018-4407 Massive IOS/MAC Attack Exploit 
CVE-2018-4407 is a Simple and Very Fast BOF attack Against IOS/MAC that can lead to DOS. The vulnerability is a heap buffer overflow in the networking code in the XNU operating system kernel. XNU is used by both iOS and macOS, which is why iPhones, iPads, and Macbooks are all affected. 

##### Usage 
```
apt-get install nmap
git clone https://github.com/r3dxpl0it/CVE-2018-4407.git && cd CVE-2018-4407 && pip install -r requirements.txt
```
##### Options : 
```
usage: test.py [-h] [-s IP] [-p PLAYLOAD] target

positional arguments:
  target                Target Ip or Network Ip Range

optional arguments:
  -h, --help            show this help message and exit
  -s IP, --sourceip IP  Source Ip Adress
  -p PLAYLOAD, --payload PLAYLOAD
                        Number of Payload Loop
```
* "PlayLoad" is Not a Miss-Type Nor a Mistake, Just a Joke ;)
##### Screen : 
* This ScreenShot Has Been Taken from the "Virtual Lab". 
[![CVE-2018-4407](https://github.com/r3dxpl0it/CVE-2018-4407/blob/master/vb_sc.png)]

##### Disclaimer : 
* Read The Licence
File Snapshot

[4.0K] /data/pocs/97ce349e1f3d97ac888567732570211a5ca0b278 ├── [1.8K] exploit.py ├── [ 34K] LICENSE ├── [1.1K] README.md ├── [ 27] requirements.txt └── [112K] vb_sc.png 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.