lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 26 Apr 2014 12:14:40 +0200 From: Jérôme Nokin <jerome@...laby.be> To: fulldisclosure@...lists.org Subject: [FD] Symantec Endpoint Protection – Remote Buffer Overflow PoC (CVE-2013-1612) Hello, Here is a PoC of the CVE-2013-1612 bug, targeting SEP Manager version 12.1.0 -> 12.1.2. It's a simple SEH-based code which set EIP to 0xcccccccc. I've tried to write a stable exploit code but so far, it is still unreliable. I meant that it works great in my labs, but will not work on yours. Everything is explained here if you want to give a try.. http://funoverip.net/2014/04/symantec-endpoint-protection-manager-cve-2013-1612-remote-buffer-overflow-poc/ Bug references: - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20130618_00 - http://www.securityfocus.com/bid/60542/info - https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1612 Regards, Jérôme Nokin http://funoverip.net/ _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists