Firefox2.0.0.16でUTF-8を使ったURLのリモートバッファオーバーフローな脆弱性のExploitみたいです。
#!/usr/bin/python
# FireFox 2.0.0.16 Windows XP SP3 x86 Remote Exploit
# Author: Dominic Chell <dmc@deadbeef.co.uk>
#
# Exploits the UTF-8 URL overflow vulnerability described in CVE-2008-0016.
# As of September 2009 there are no public exploits for this vulnerability.
# However, according to securityfocus an exploit is available in both Canvas
# and Core Impact.
#
# Thanks to meta and ChrisA
Webサーバを立ち上げちゃうらしいです。
print "FireFox 2.0.0.16 x86 Exploit\nAuthor: dmc@deadbeef.co.uk\n"
print "[*] Starting evil web server"
print "[*] Waiting for clients\n"
しかたがない、Agein!
# Adduser shellcode encoded with shikata_ga_nai
# USER=r00t PASS=r00tr00t!!