Metasploit mailing list archives
[PHP_Exploit]Problem
From: Pascal.FOULON at supinfo.com (FOULON Pascal)
Date: Fri, 01 Jun 2007 17:40:17 +0200
Thanks for your help. [+]The target is running 32-bit x86 [+]0808d000-08137000 rwxp 0808d000 00:00 0 [heap] [+]No grsec or any stackshield But you are right, maybe my target parameters are wrong, it seems the default address range is wrong for my case. Thanks Le 1/06/07 15:46, ??H D Moore?? <hdm at metasploit.com> a ?crit?:
A few things to check: * The target is running 32-bit x86 * The heap area is marked executable or the CPU does not support NX * Hardening patches, like grsec, have not been installed Finally, if you can, cat /proc/[pid of apache child that has handled PHP]/maps and look at the first [heap] segment. Make sure this matches up with your target parameters. -HD On Friday 01 June 2007 08:41, FOULON Pascal wrote:I have a problem with the php_unserialize_zval_cookie exploit. I ran it versus: Debian 4.0_r0 Apache 1.3.34 PHP 4.4.4-8+etch3 PhpBB PunBB The exploit brute force the ret address, and finish without any shell. I tried to lower the step for the brute force, but nothing happend more. I checked, and this version of php is vuln. Could you help me on this?
Pascal FOULON SLA - SUPINFO Laboratories Formateur Laboratoire S?curit? Si?ge International : 23 rue du Ch?teau Landon - F-75010 Paris - FRANCE SUPINFONE : +33 (0)153359700 - Poste : 148515 Fax : +33 (0)153359701 SUPINFO - Ecole Sup?rieure d'Informatique? Si?ge International : 23 rue du Ch?teau Landon - F-75010 Paris - FRANCE www.supinfo.com --------------------------------- This message and any attachments (hereinafter referred to as the "message") is intended solely for the addressees and is confidential. If you receive this message in error, please delete it and immediately notify the sender at The International Institute of Information Technology (hereinafter referred to as "SUPINFO"). Any use not in accord with its purpose, any dissemination or disclosure, either whole or partial, is prohibited except formal approval. Because the internet can not guarantee the integrity of this message, SUPINFO and its subsidiaries, laboratories and regional branches will not therefore be liable for the message that could only engage his author, not SUPINFO, and only if not modified. --------------------------------- Ce message et toutes les pieces jointes (ci-apres d?nomm? le "message") sont etablis a l'attention exclusive de ses destinataires et sont donc confidentiels. Si toutefois vous recevez ce message par erreur, nous vous remercions de bien vouloir le detruire et d'en avertir immediatement l'expediteur au sein de l'Ecole Sup?rieure d'Informatique (ci-apr?s d?nomm?e "SUPINFO"). Toute utilisation de ce message non conforme a sa destination, toute diffusion ou toute publication, totale ou partielle, est interdite, sauf autorisation expresse. Internet ne permettant pas d'assurer l'integrite des messages e-mail en g?n?ral et donc de ce message en particulier, SUPINFO et ses filiales, sites r?gionaux, laboratoires ou autres entit?s attach?es, declinent toute responsabilite au titre du pr?sent message qui ne pourrait engager que son auteur et non SUPINFO et seulement dans l'hypothese ou le message n'aurait pas ete modifie par quelque moyen que ce soit. ---------------------------------
Current thread:
- [PHP_Exploit]Problem FOULON Pascal (Jun 01)
- [PHP_Exploit]Problem H D Moore (Jun 01)
- [PHP_Exploit]Problem FOULON Pascal (Jun 01)
- [PHP_Exploit]Problem H D Moore (Jun 01)
- [PHP_Exploit]Problem FOULON Pascal (Jun 01)
- [PHP_Exploit]Problem FOULON Pascal (Jun 01)
- [PHP_Exploit]Problem H D Moore (Jun 01)