Hi List,
 
 
I found yesterday this bug in the last version of MiniShare.
This is a simple buffer overflow in the address link.
Vendors are contacted at http://minishare.sourceforge.net
1 hour only before the public advisorie.
 
Actually no fix are available. The exploit is available in attachment for the list peoples, and available at dfind.kd-team.com my homepage.
 
class101
 
 
/*
 
 
 
MiniShare <= 1.4.1, Remote Buffer Overflow Exploit v0.1.
Bind a shellcode to the port 101.
 
Full disclosure and exploit
by class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet
07 november 2004
 
Thanx to HDMoore and Metasploit.com for their kickass ASM work.
 

------------------
WHAT IS MINISHARE
------------------
 
Homepage - http://minishare.sourceforge.net/
 
 MiniShare is meant to serve anyone who has the need to share files to anyone,
 doesn't have a place to store the files on the web,
    and does not want or simply does not have the skill
 and possibility to set up and maintain a complete HTTP-server software...
 
--------------
VULNERABILITY
--------------
 
 A simple buffer overflow in the link length, nothing more
 read the code for further instructions.
 
----
FIX
----
 
 Actually none, the vendor is contacted the same day published, 1 hour before you.
    As a nice fuck to NGSS , iDEFENSE and all others private disclosures
 homo crew ainsi que K-OTiK, ki se tap' des keu dans leur "Lab"
 lol :->
 
----
EXTRA
----
  
 Update the JMP ESP if you need. A wrong offset will crash minishare.
 Code tested working on MiniShare 1.4.1 and WinXP SP1 English, Win2k SP4 English, WinNT SP6 English
 Others MiniShare's versions aren't tested.
    Tip: If it crashes for you , try to play with Sleep()...
 
----
BY
----
 
    class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet
       who
      greets
    DiabloHorn [at] www.kd-team.com [&] #kd-team [at] EFnet
 
*/
 

Attachment: 101_mini.cpp
Description: Binary data

Reply via email to