Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4936 PoC — Malwarebytes Anti-Malware和Malwarebytes Anti-Exploit 安全漏洞

Source
Associated Vulnerability
Title:Malwarebytes Anti-Malware和Malwarebytes Anti-Exploit 安全漏洞 (CVE-2014-4936)
Description:Malwarebytes Anti-Malware(MBAM)和Malwarebytes Anti-Exploit(MBAE)都是美国Malwarebytes公司的安全产品。MBAM是一套反恶意反间谍软件,支持删除蠕虫、拨号程序、木马和其他恶意软件;MBAE是一套反漏洞攻击工具,支持保护和预防所有已知和未知的0-day漏洞攻击,保护Web浏览器。 MBAM consumer 2.0.3之前版本和MBAE consumer 1.04.1.1012及之前版本的升级功能中存在安全漏洞。攻击者可通过欺骗升级服务器
Description
Repository for CVE-2014-4936 POC code.
Readme
## CVE-2014-4936: Malwarebytes Anti-Malware and Anti-Exploit upgrade hijacking ##
=============

This repository contains the POC for CVE-2014-4936. A full writeup on how the vulnerability works and how to exploit it using the POC has been published here:
(http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and)

### Timeline: ###

- Malwarebytes Anti-Malware
	- Vulnerability discovered: `June 18th 2014`
	- Vulnerability reported: `July 16th 2014`
	- Vulnerability fixed in version `2.0.3` released on `October 3rd 2014`
- Malwarebytes Anti-Exploit
	- Vulnerablity discovered: `August 19th 2014`
	- Vulnerability reported: `August 21st 2014`
	- Vulnerability fixed in version `1.04.1.1012` released on `September 5th 2014`

### The vulnerability ###

Both Anti-Malware and Anti-Exploit have upgrade capabilities through the form of HTTP transfered installation packages. Both software packages have no or limited upgrade validation implemented thus allowing anyone who can work out the upgrade protocol to inject their own payload.
File Snapshot

[4.0K] /data/pocs/9ff0f337d5dded641373ee79842cbbf13cac0d77 ├── [8.7K] Malwarebytes-CDN-Simulator-CVE-2014-4936.py └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.