vendor:
by:
Alexys
3.1
CVSS
MEDIUM
Code Injection
94
CWE
Product Name:
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Linux
2021
Linux-x64 – XOR Encrypted Shellcode for execve() with /bin//sh Argument
The exploit involves creating a new process in Linux x86_64 by utilizing the execve() system call with an argument of /bin//sh. The shellcode is XOR encrypted, with the encrypted value being QWORD size (/bin - //sh). The assembly code uses XOR operations to set up the arguments for execve() and then executes the system call. The C code snippet demonstrates the execution of the shellcode from the stack.
Mitigation:
To mitigate this vulnerability, ensure that all input is properly sanitized and validated to prevent unauthorized code execution.