<<< Date Index >>>     <<< Thread Index >>>

Portable shell-exploit for buffer-overflow bugs



Hello str0ke,

I reviewed the exploits listed. Yes, all of them use the shell but they
exploit trivially shell-exploitable bugs (like race conditions, ld-preload,
etc) or include other "external" programs (like cc, perl, etc) or assume
Linux/bash as well as other more or less recent environments.

The nearest exploit to what I was looking for (buffer overflow exploit in
shell-scripting) is:
http://milw0rm.com/exploits/18

But it lacks compatibility. For instance, "echo" command is very variable,
depending on OS/Shell version. I've uploaded a proof of concept which I
wrote some time ago, showing my approach, to:
http://www.rs-labs.com/exploitsntools/rs_aix_host.sh
(~6 KB)

It may not be perfect but my goal was to make it work in a very old minimal
Unix environment (the exploit yields local root on AIX 4.1.4.0, abusing a
known and ancient bug: ~ 10 years old!) and at the same time compatible
with some recent systems like Linux/bash (logically, the vulnerability is
not present in such systems, I'm referring to the skel of the exploit).

Feedback would be appreciated.

PS: I'm cc'ing some lists where this post could suit. Moderators should decide.

Cheers,
-Roman


str0ke escribió:
> How goes it Roman,
> 
>> Which other "curious" exploits in shell do you know of?
> 
> Attached is a list of the known exploits that are in shell, some call
> other languages some don't.
> 
> Be safe,
> /str0ke
> 
> 
> ------------------------------------------------------------------------
> 
> date          exploit title                                                   
>                 exploit                                 author                
>   platform
> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> 2003-04-23    Snort <=1.9.1 Remote Root Exploit (p7snort191.sh)               
>                 http://milw0rm.com/exploits/18          truff                 
>   linux
> 2003-05-02    OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)            
>                 http://milw0rm.com/exploits/26          Nicolas Couture       
>   linux
> 2003-07-22    Cisco IOS (using hping) Remote Denial of Service Exploit        
>                 http://milw0rm.com/exploits/62          zerash                
>   hardware
> 2004-01-25    MS Windows XP/2003 Samba Share Resource Exhaustion Exploit      
>                 http://milw0rm.com/exploits/148         Steve Ladjabi         
>   windows
> 2000-11-16    /sbin/restore exploit (rh6.2)                                   
>                 http://milw0rm.com/exploits/182         n/a                   
>   linux
> 2000-11-17    Slackware Linux /usr/bin/ppp-off Insecure /tmp Call Exploit     
>                 http://milw0rm.com/exploits/185         sinfony               
>   linux
> 2000-11-19    dump 0.4b15 Local Root Exploit                                  
>                 http://milw0rm.com/exploits/193         Mat                   
>   linux
> 2000-11-19    HP-UX 11.00/10.20 crontab Overwrite Files Exploit               
>                 http://milw0rm.com/exploits/195         dubhe                 
>   hp-ux
> 2000-11-21    vixie-cron Local Root Exploit                                   
>                 http://milw0rm.com/exploits/203         Michal Zalewski       
>   linux
> 2000-12-15    Pine (Local Message Grabber) Exploit                            
>                 http://milw0rm.com/exploits/231         Mat                   
>   linux
> 2001-01-02    Redhat 6.1 / 6.2 TTY Flood Users Exploit                        
>                 http://milw0rm.com/exploits/236         teleh0r               
>   linux
> 2001-01-03    Solaris 2.6 / 7 / 8 Lock Users Out of mailx Exploit             
>                 http://milw0rm.com/exploits/240         optyx                 
>   solaris
> 2001-01-25    glibc-2.2 and openssh-2.3.0p1 exploits glibc >= 2.1.9x          
>                 http://milw0rm.com/exploits/258         krochos               
>   linux
> 2001-05-07    IRIX (5.3/6.2/6.3/6.4/6.5/6.5.11) /usr/bin/lpstat Local Exploit 
>                 http://milw0rm.com/exploits/265         LSD-PLaNET            
>   irix
> 2001-05-08    IRIX (5.3/6.2/6.3/6.4/6.5/6.5.11) /usr/lib/print/netprint Local 
> Exploit         http://milw0rm.com/exploits/270         LSD-PLaNET            
>   irix
> 2001-03-04    GLIBC 2.1.3 ld_preload Local Exploit                            
>                 http://milw0rm.com/exploits/290         shadow                
>   linux
> 1997-05-03    Solaris 2.5.1 lp and lpsched Symlink Vulnerabilities            
>                 http://milw0rm.com/exploits/330         Chris Sheldon         
>   solaris
> 1997-05-19    Solaris 2.5.0/2.5.1 ps & chkey Data Buffer Exploit              
>                 http://milw0rm.com/exploits/332         Joe Zbiciak           
>   solaris
> 2004-07-22    Xitami Web Server Denial of Service Exploit                     
>                 http://milw0rm.com/exploits/362         CoolICE               
>   windows
> 2004-09-07    CDRDAO Local Root Exploit                                       
>                 http://milw0rm.com/exploits/434         Karol Wiêsek          
>   linux
> 2004-09-22    MS Windows JPEG Processing Buffer Overrun Exploit (MS04-028)    
>                 http://milw0rm.com/exploits/474         perplexy              
>   windows
> 2004-09-23    MS Windows JPEG GDI+ Overflow Administrator Exploit (MS04-028)  
>                 http://milw0rm.com/exploits/475         Elia Florio           
>   windows
> 2004-09-28    Serendipity 0.7-beta1 SQL Injection Proof of Concept            
>                 http://milw0rm.com/exploits/561         aCiDBiTS              
>   php
> 2004-10-16    BSD bmon <= 1.2.1_2 Local Exploit                               
>                 http://milw0rm.com/exploits/579         Idan Nahoum           
>   bsd
> 2004-12-21    AIX 5.1 to 5.3 lsmcode Local Root Command Execution             
>                 http://milw0rm.com/exploits/701         cees-bart             
>   aix
> 2005-01-30    Linux ncpfs Local Exploit                                       
>                 http://milw0rm.com/exploits/779         super                 
>   linux
> 2005-02-07    Exim <= 4.42 Local Root Exploit                                 
>                 http://milw0rm.com/exploits/796         Dark Eagle            
>   linux
> 2005-03-25    AIX <= 5.3.0 (invscout) Local Command Execution Vulnerability   
>                 http://milw0rm.com/exploits/898         ri0t                  
>   aix
> 2005-04-07    PHP-Nuke 6.x - 7.6 Top module Remote Sql Injection Exploit      
>                 http://milw0rm.com/exploits/921         Fabrizi Andrea        
>   php
> 2005-05-17    Linux Mandrake <= 10.2 cdrdao Local Root Exploit                
>                 http://milw0rm.com/exploits/997         newbug                
>   linux
> 2005-08-05    Lantronix Secure Console Server (edituser) Local Root Exploit   
>                 http://milw0rm.com/exploits/1136        c0ntex                
>   linux
> 2005-09-24    Qpopper <= 4.0.8 (poppassd) Local Root Exploit (linux)          
>                 http://milw0rm.com/exploits/1229        kcope                 
>   linux
> 2005-09-24    Qpopper <= 4.0.8 (poppassd) Local Root Exploit (freebsd)        
>                 http://milw0rm.com/exploits/1230        kcope                 
>   bsd
> 2005-11-08    SuSE Linux <= 9.3, 10 (chfn) Local Root Privilege Escalation 
> Exploit            http://milw0rm.com/exploits/1299        Hunger             
>      linux
> 2005-11-09    Operator Shell (osh) 1.7-14 Local Root Exploit                  
>                 http://milw0rm.com/exploits/1300        Charles Stevenson     
>   linux
> 2006-02-08    QNX Neutrino 6.2.1 (phfont) Race Condition Local Root Exploit   
>                 http://milw0rm.com/exploits/1479        kokanin               
>   QNX
> 2006-02-08    QNX RTOS 6.3.0 Insecure rc.local Permissions Plus System Crash 
> Exploit          http://milw0rm.com/exploits/1481        kokanin              
>    QNX
> 2005-10-10    SGI IRIX <= 6.5.28 (runpriv) Design Error Vulnerability         
>                 http://milw0rm.com/exploits/1577        n/a                   
>   irix
> 2006-07-14    Linux Kernel 2.6.13 <= 2.6.17.4 sys_prctl() Local Root Exploit 
> (4)              http://milw0rm.com/exploits/2011        Sunay                
>    linux
> 2006-07-15    Rocks Clusters <= 4.1 (mount-loop) Local Root Exploit           
>                 http://milw0rm.com/exploits/2016        Xavier de Leon        
>   linux
> 2006-07-21    MS Internet Explorer (MDAC) Remote Code Execution Exploit 
> (MS06-014)            http://milw0rm.com/exploits/2052        redsand         
>         windows
> 2006-08-01    Mac OS X <= 10.4.7 fetchmail Privilege Escalation Exploit       
>                 http://milw0rm.com/exploits/2108        Kevin Finisterre      
>   osX
> 2006-08-08    liblesstif <= 2-0.93.94-4mdk (DEBUG_FILE) Local Root Exploit    
>                 http://milw0rm.com/exploits/2144        Karol Wiesek          
>   linux
> 2006-08-21    Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow 
> PoC                http://milw0rm.com/exploits/2237        Jacobo Avariento   
>      multiple
> 2006-08-22    Solaris 8 / 9 (/usr/ucb/ps) Local Information Leak Exploit      
>                 http://milw0rm.com/exploits/2242        Marco Ivaldi          
>   solaris
> 2006-09-27    OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service 
> Exploit           http://milw0rm.com/exploits/2444        Tavis Ormandy       
>     multiple
>