vendor:
Cain & Abel
by:
send9
7.5
CVSS
HIGH
Buffer Overflow
121
CWE
Product Name: Cain & Abel
Affected Version From: Cain & Abel v4.9.25 (and below)
Affected Version To: Cain & Abel v4.9.25 (and below)
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows
Cain & Abel v4.9.25 (and below) Simple Overflow Exploit
This script exploits a buffer overflow vulnerability in Cain & Abel v4.9.25 (and below) to execute arbitrary code. By importing the generated file as a config file under Cracker -> Cisco IOS-MD5 Hashes, an attacker can gain control of the target system. The exploit uses a return address to the 'call esp' instruction in kernel32.dll to redirect the execution flow to the attacker's shellcode. The shellcode used in this exploit is a Metasploit generated payload that executes the 'calc.exe' program. Note that the return address may need to be adjusted to match the target system.
Mitigation:
Apply the latest version of Cain & Abel that does not contain the buffer overflow vulnerability. Avoid importing untrusted config files into the Cracker -> Cisco IOS-MD5 Hashes module.