Vulnerability Development mailing list archives
Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works?
From: <jove () gaza halo nu>
Date: Mon, 6 May 2002 07:23:40 -0500 (CDT)
The exploit works, what I recommend doing to get it to work is load up gdb, and type "break _snmp_parse" or whatever I told you to do in the comments section. When it hits that breakpoing type x/900 0xbfffd700 and pick a point in the memory that's kind of in the middle and that'll be your address, if you've created signatures for this exploit it would be wonderful if you could share that way I could develop the exploit further and release new code for all of you. -Jove On Sat, 4 May 2002, Jim Kovalchuk wrote:
Make sure the offset in the code (0xbfffd77c) is within your NOP sled. pub 1024D/4D4E605E 2001-10-05 Jim Kovalchuk <raxor () dexlink com> Fingerprint: 6DF1 31C6 05E9 FCA6 02AB 386D 5640 EF8C 4D4E 605E On Sat, 4 May 2002, Paul_Asadoorian wrote:I came across the following exploit on packetstorm and have been unable to get it to work. It crashes the daemon but never creates a shell on the specified port. Anyone else had any luck? http://packetstormsecurity.org/0203-exploits/ucd-snmp.c Thanks, Paul A struggling SANS GCIH student
Current thread:
- Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Paul_Asadoorian (May 04)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Jim Kovalchuk (May 05)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? jove (May 06)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Jim Kovalchuk (May 05)