vendor:
Timbuktu Pro
by:
bannedit
N/A
CVSS
N/A
Buffer Overflow
119
CWE
Product Name: Timbuktu Pro
Affected Version From: Timbuktu Pro version <= 8.6.6
Affected Version To: Timbuktu Pro version <= 8.6.6
Patch Exists: NO
Related CWE: CVE-2009-1394
CPE: N/A
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=39563, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/smb/timbuktu_plughntcommand_bof, https://www.infosecmatter.com/nessus-plugin-library/?id=75629, https://www.infosecmatter.com/nessus-plugin-library/?id=79454, https://www.infosecmatter.com/nessus-plugin-library/?id=44062, https://www.infosecmatter.com/nessus-plugin-library/?id=67988, https://www.infosecmatter.com/nessus-plugin-library/?id=50046, https://www.infosecmatter.com/nessus-plugin-library/?id=74854, https://www.infosecmatter.com/nessus-plugin-library/?id=60532, https://www.infosecmatter.com/nessus-plugin-library/?id=52523
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2009
Timbuktu <= 8.6.6 PlughNTCommand Named Pipe Buffer Overflow
This module exploits a stack based buffer overflow in Timbuktu Pro version <= 8.6.6 in a pretty novel way. This exploit requires two connections. The first connection is used to leak stack data using the buffer overflow to overwrite the nNumberOfBytesToWrite argument. By supplying a large value for this argument it is possible to cause Timbuktu to reply to the initial request with leaked stack data. Using this data allows for reliable exploitation of the buffer overflow vulnerability. Props to Infamous41d for helping in finding this exploitation path. The second connection utilizes the data from the data leak to accurately exploit the stack based buffer overflow vulnerability.
Mitigation:
No known mitigation or remediation for this vulnerability