Vulnerability Development mailing list archives

Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works?


From: <jove () gaza halo nu>
Date: Mon, 6 May 2002 07:23:40 -0500 (CDT)

The exploit works, what I recommend doing to get it to work is load up
gdb, and type "break _snmp_parse" or whatever I told you to do in the
comments section.  When it hits that breakpoing type x/900 0xbfffd700 and
pick a point in the memory that's kind of in the middle and that'll be
your address, if you've created signatures for this exploit it would be
wonderful if you could share that way I could develop the exploit further
and release new code for all of you.

-Jove

On Sat, 4 May 2002, Jim Kovalchuk wrote:

Make sure the offset in the code (0xbfffd77c) is within your NOP sled.

pub  1024D/4D4E605E 2001-10-05 Jim Kovalchuk <raxor () dexlink com>
Fingerprint: 6DF1 31C6 05E9 FCA6 02AB  386D 5640 EF8C 4D4E 605E

On Sat, 4 May 2002, Paul_Asadoorian wrote:

I came across the following exploit on packetstorm and have been unable
to get it to work.  It crashes the daemon but never creates a shell on
the specified port.  Anyone else had any luck?

http://packetstormsecurity.org/0203-exploits/ucd-snmp.c

Thanks,
Paul

A struggling SANS GCIH student




Current thread: