{"href": "https://www.seebug.org/vuldb/ssvid-10831", "status": "poc", "bulletinFamily": "exploit", "modified": "2009-03-17T00:00:00", "title": "win32 SEH omelet shellcode v0.1", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-10831", "cvelist": [], "description": "No description provided by source.", "viewCount": 4, "published": "2009-03-17T00:00:00", "sourceData": "\n A small piece of shellcode written in assembler that can scan the user-land\r\naddress space for small blocks of memory ("eggs") and recombine the eggs into\r\none large block. When done, the large block is executed. This is useful when you\r\ncan only insert small blocks at random locations into a process and not one\r\ncontiguous large block containing your shellcode in one piece: this code will\r\nrecombine the eggs to create your shellcode in the process and execute it.\r\n\r\nThis version works only on Windows 32-bit platforms because it uses the Windows\r\nspecific Structured Exception Handler (SEH) feature to handle access violations\r\ncaused by scanning memory.\r\n\r\nMore details can be found here:\r\n\r\nhttp://skypher.com/wiki/index.php?title=Shellcode/w32_SEH_omelet_shellcode\r\nhttp://code.google.com/p/w32-seh-omelet-shellcode/\r\nbackup: http://milw0rm.com/sploits/2009-w32-SEH-omlet-shellcode-v0.1.zip\r\n\r\nI have not had a chance to test this newer version in a live exploit, so do\r\nlet me know if you have a chance to use it.\r\n\r\nCheers,\r\nSkyLined \n ", "id": "SSV:10831", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T18:56:32", "reporter": "Root", "enchantments": {"score": {"value": 0.3, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.3}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645310008}}