module

Iconics GENESIS32 Integer Overflow Version 9.21.201.01

Disclosed
Mar 21, 2011
Created
May 30, 2018

Description

The GenBroker service on port 38080 is affected by three integer overflow
vulnerabilities while handling opcode 0x4b0, which is caused by abusing the
the memory allocations needed for the number of elements passed by the client.
This results unexpected behaviors such as direct registry calls, memory location
calls, or arbitrary remote code execution. Please note that in order to ensure
reliability, this exploit will try to open calc (hidden), inject itself into the
process, and then open up a shell session. Also, DEP bypass is supported.

Authors

Luigi Auriemma
Lincoln
corelanc0d3r peter.ve@corelan.be

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/scada/iconics_genbroker
msf exploit(iconics_genbroker) > show targets
...targets...
msf exploit(iconics_genbroker) > set TARGET < target-id >
msf exploit(iconics_genbroker) > show options
...show and set options...
msf exploit(iconics_genbroker) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.