
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
90 lines
No EOL
4.3 KiB
Text
90 lines
No EOL
4.3 KiB
Text
_______________________________________________________
|
|
| |
|
|
/ | * AIMP 2.51 build 330 (ID3v1/ID3v2 Tag) * |
|
|
/---, | * Remote Stack Buffer Overflow PoC (SEH) * |
|
|
-----# ==| | |
|
|
| :) # ==| |......................................................|
|
|
-----'----# | |______________________________________________________|
|
|
|)___() '# |______====____ \___________________________________|
|
|
[_/,-,\"--"------ //,-, ,-,\\\ |/ //,-, ,-, ,-,\\ __#
|
|
( 0 )|===******||( 0 )( 0 )||- o '( 0 )( 0 )( 0 )||
|
|
----'-'--------------'-'--'-'-----------------------'-'--'-'--'-'---------------
|
|
################################################################################
|
|
|
|
|
|
*** Summary: Freeware audio player
|
|
|
|
*** Product web page: http://www.aimp.ru/
|
|
|
|
*** Desc: AIMP version 2.51 build 330 suffers from a stack based buffer overflow
|
|
vulnerability that can be exploited via malicious media file that
|
|
supports ID3 tags (mp3). EIP and ECX registers gets overwritten,
|
|
including the SE handler and the pointer to the next SEH record. The
|
|
issue is trigered by playing the file (crashes within 5 seconds) or
|
|
by viewing the file's metadata or by pressing the F4 key and selecting
|
|
the ID3v1 or ID3v2 tab.
|
|
|
|
*** Tested on Microsoft Windows XP Professional SP3 (English)
|
|
|
|
*** Windbg log:
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
(f3c.850): Access violation - code c0000005 (first chance)
|
|
First chance exceptions are reported before any exception handling.
|
|
This exception may be expected and handled.
|
|
eax=00000000 ebx=00000000 ecx=41414141 edx=7c9032bc esi=00000000 edi=00000000
|
|
eip=41414141 esp=0012d770 ebp=0012d790 iopl=0 nv up ei pl zr na pe nc
|
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210246
|
|
*** WARNING: Unable to verify checksum for image00400000
|
|
*** ERROR: Module load completed but symbols could not be loaded for image00400000
|
|
image00400000+0x14141:
|
|
41414141 0000 add byte ptr [eax],al ds:0023:00000000=??
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
|
|
*** Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
|
|
*** liquidworm gmail com
|
|
|
|
*** http://www.zeroscience.org/
|
|
|
|
*** 29.05.2009
|
|
|
|
|
|
################################################################################
|
|
|
|
>>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<<
|
|
>>> *** PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<<
|
|
|
|
################################################################################
|
|
|
|
|
|
|
|
|
|
'SHPA !!!
|
|
###########
|
|
. .
|
|
.n . . n.
|
|
. .dP dP 9b 9b. .
|
|
4 qXb . dX Xb . dXp t
|
|
dX. 9Xb .dXb __ __ dXb. dXP .Xb
|
|
9XXb._ _.dXXXXb dXXXXbo. .odXXXXb dXXXXb._ _.dXXP
|
|
9XXXXXXXXXXXXXXXXXXXVXXXXXXXXOo. .oOXXXXXXXXVXXXXXXXXXXXXXXXXXXXP
|
|
`9XXXXXXXXXXXXXXXXXXXXX'~ ~`OOO8b d8OOO'~ ~`XXXXXXXXXXXXXXXXXXXXXP'
|
|
`9XXXXXXXXXXXP' `9XX' Yo! `98v8P' Thricer `XXP' `9XXXXXXXXXXXP'
|
|
~~~~~~~ 9X. .db|db. .XP ~~~~~~~
|
|
)b. .dbo.dP'`v'`9b.odb. .dX(
|
|
,dXXXXXXXXXXXb dXXXXXXXXXXXb.
|
|
dXXXXXXXXXXXP' . `9XXXXXXXXXXXb
|
|
dXXXXXXXXXXXXb d|b dXXXXXXXXXXXXb
|
|
9XXb' `XXXXXb.dX|Xb.dXXXXX' `dXXP
|
|
`' 9XXXXXX( )XXXXXXP `'
|
|
XXXX X.`v'.X XXXX
|
|
XP^X'`b d'`X^XX
|
|
X. 9 ` ' P )X
|
|
`b ` ' d'
|
|
` '
|
|
|
|
# milw0rm.com [2009-06-01] |