mailing list archives
[New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit
From: "class 101" <class101 () phreaker net>
Date: Sun, 7 Nov 2004 14:12:51 +0100
I found yesterday this bug in the last version of MiniShare.
This is a simple buffer overflow in the address link.
Vendors are contacted at http://minishare.sourceforge.net
1 hour only before the public advisorie.
Actually no fix are available. The exploit is available in attachment for the list peoples, and available at
dfind.kd-team.com my homepage.
MiniShare <= 1.4.1, Remote Buffer Overflow Exploit v0.1.
Bind a shellcode to the port 101.
Full disclosure and exploit
by class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet
07 november 2004
Thanx to HDMoore and Metasploit.com for their kickass ASM work.
WHAT IS MINISHARE
Homepage - http://minishare.sourceforge.net/
MiniShare is meant to serve anyone who has the need to share files to anyone,
doesn't have a place to store the files on the web,
and does not want or simply does not have the skill
and possibility to set up and maintain a complete HTTP-server software...
A simple buffer overflow in the link length, nothing more
read the code for further instructions.
Actually none, the vendor is contacted the same day published, 1 hour before you.
As a nice fuck to NGSS , iDEFENSE and all others private disclosures
homo crew ainsi que K-OTiK, ki se tap' des keu dans leur "Lab"
Update the JMP ESP if you need. A wrong offset will crash minishare.
Code tested working on MiniShare 1.4.1 and WinXP SP1 English, Win2k SP4 English, WinNT SP6 English
Others MiniShare's versions aren't tested.
Tip: If it crashes for you , try to play with Sleep()...
class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet
DiabloHorn [at] www.kd-team.com [&] #kd-team [at] EFnet
- [New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit class 101 (Nov 07)