
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
93 lines
No EOL
3.9 KiB
Text
93 lines
No EOL
3.9 KiB
Text
-----BEGIN PGP SIGNED MESSAGE-----
|
||
Hash: SHA1
|
||
|
||
=============================================================================
|
||
=============================================================================
|
||
Mobipocket Reader version 6.2 Build 608 Buffer Overflow
|
||
Url: http://www.mobipocket.com/en/HomePage/default.asp?Language=EN
|
||
|
||
Author: shinnai
|
||
mail: shinnai[at]autistici[dot]org
|
||
site: http://shinnai.altervista.org/
|
||
|
||
This was written for educational purpose. Use it at your own risk.
|
||
Author will be not responsible for any damage.
|
||
|
||
Tested on:
|
||
Microsoft Windows 7 Professional
|
||
6.1.7601 Service Pack 1 build 7601
|
||
|
||
Info (http://en.wikipedia.org/wiki/Mobipocket):
|
||
Mobipocket SA is a French company incorporated in March 2000 which
|
||
produces Mobipocket Reader software, an E-Book reader for some PDAs,
|
||
phones and desktop operating systems.
|
||
|
||
The Mobipocket software package is free and consists of various
|
||
publishing and reading tools for PDA, Smartphones, cellular phones
|
||
and e-book devices (Symbian, Windows Mobile, Palm OS, webOS, Java ME,
|
||
BlackBerry, Psion, Kindle and iLiad).
|
||
Mobipocket.com was bought by Amazon.com in 2005.[1] Amazon's acquisition
|
||
was believed to be a result of Adobe Systems's announcement that it would
|
||
no longer sell its eBook packaging and serving software.[2]
|
||
|
||
An alpha release of the java-based version of the mobipocket reader was
|
||
made available for cellphones on June 30, 2008.[3] There is also a reader
|
||
for desktop computers running Microsoft Windows, which also works with
|
||
computers running Mac OS X and Linux using WINE.[4]
|
||
|
||
It has been widely reported that since Amazon's acquisition of Mobipocket,
|
||
software support, user support, and platform growth was ended. In December,
|
||
2011, it was reported that Amazon officially notified the book publishers
|
||
that it was ending support for Mobipocket.
|
||
RIP: Mobipocket 2000-2011, Mobipocket eBook Format Is Gone, et.al. The
|
||
status of Mobipocket DRM content previously purchased by users continues
|
||
to be unclear since currently no other ebook reader supports this propriety
|
||
DRM method.
|
||
|
||
PoC released as is, I have no time at the moment for further investigations
|
||
|
||
=============================================================================
|
||
=============================================================================
|
||
|
||
Crafting a .chm file is possible to cause a stack based buffer overflow. In
|
||
the case of this PoC, registers at the moment of crash are as follow.
|
||
|
||
EAX 0012F6B8
|
||
ECX 000002D5
|
||
EDX 000003E3
|
||
EBX 00000000
|
||
ESP 0012F6F4
|
||
EBP FFFFFFFF
|
||
ESI 04064A4C
|
||
EDI 094BDF98 UNICODE " p"
|
||
EIP 00F31941
|
||
|
||
CPU Stack
|
||
Address Value ASCII Comments
|
||
0012F6E8 00F31941 Aó
|
||
|
||
As you can see, the content of EIP is just the value of the stack address
|
||
at 0x0012F6E8
|
||
|
||
PoC: http://shinnai.altervista.org/exploits/mobi.rar
|
||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18774.rar
|
||
|
||
=============================================================================
|
||
=============================================================================
|
||
-----BEGIN PGP SIGNATURE-----
|
||
Version: GnuPG v1.4.12 (MingW32)
|
||
|
||
iQIcBAEBAgAGBQJPlQfOAAoJEJlK/ai8vywm97sQALN/vS0GxycfBedQXOtspa5s
|
||
c5wvRu615YEBnDhskWVQCJV/hUP1mRvN0fIn6x2a8VgCBSfoTTezDhSQe7ZKl7Ye
|
||
zilEVakWUzvqx8sHPmNby6Bg0FAL3QAaguXOSVbM+iQG2x033AkvAhp0Hel5KZRw
|
||
6UmbLBPtFgux7BcLCBDC02XydacSoRo3/2Mv5fR9qcyMuLOrD6X+cxvRAGNsOWtV
|
||
8w0jSJwXoKRAnD56MWV5fYqz2frtMhQFNU0QR1y78Q9uzLJ/nWs5g3TkLW7yYwcQ
|
||
kANjzMxLV3TZRcobmxZJvVdgHG0H+aUXcbqku0GUMqYk1rIX7Ry+96bvDjLw5qN0
|
||
7SEhRYqv/lsqOacUt563cCxPzEWS2tstWyUs1kZpT/ox0gA7EHi4TfVKt8P45Luf
|
||
jFT1qgla+CgAAM6yYuzixjhZD0fH22rL/1vgmJ50PdCkR8PPT49f9IFL+7XlskSn
|
||
vLbUbpkstJKTt4a7p4Ou1HNiK07QoQjzZnU/ejnlrlvLfevJMbNNQSIV9uVQjESZ
|
||
tj58BQxbcfzZ3gyjlHrZ1ECh7+f/X9GL6kdXAo2jLsNHcnD5fEeo73JUsJKpoMFx
|
||
ljN1upfItDblkD+I0ylzf7l2VFk+/Q8YHfWEpvdKw6k2X+lFSFPnnmJ7tLtZEjsc
|
||
m939C+muZ76HDSPRX3vt
|
||
=Fks2
|
||
-----END PGP SIGNATURE----- |