Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-3716 PoC — Apple Mac OS X 缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Apple Mac OS X 缓冲区溢出漏洞 (CVE-2012-3716)
Description:Apple Mac OS X是美国苹果(Apple)公司为Mac计算机所开发的一套专用操作系统。 Apple Mac OS X 10.7.5之前的10.7.x版本中的CoreText中存在漏洞。远程攻击者可利用该漏洞通过特制的文本字形,执行任意代码或导致拒绝服务(越界写入或读取)。
Description
use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range
Readme
killosx
=======

Use Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all vulnerable Apple devices within wifi range.

Installation:
=======

Run 'make install' in the killosx directory. killosx can now be run from anywhere with 'killosx'.

Usage:
=======
    killOSX
    Usage - killosx -i wlan0  ~  Run exploit on wlan0
            killosx -h        ~  This help
File Snapshot

[4.0K] /data/pocs/ef0c5542665ec82e17766e276235f1fed57652ac ├── [2.1K] killosx.sh ├── [ 70] Makefile └── [ 382] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.