what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

datarescueFormat.txt

datarescueFormat.txt
Posted Mar 22, 2005
Authored by Piotr Bania | Site pb.specialised.info

DataRescue Interactive Disassembler Pro Debugger version 4.7.0.830 is susceptible to a format string vulnerability.

tags | advisory
SHA-256 | 773388d7564b4366007ac68dcced05047436cdbab9554cbdcbac7aa936ac97e2

datarescueFormat.txt

Change Mirror Download

DataRescue Interactive Disassembler Pro Debugger Format String
Vulnerability
by Piotr Bania <bania.piotr@gmail.com>
http://pb.specialised.info


Severity: High / Medium - code execution.
Versions affected: Probably all versions, however tested on
4.7.0.830.


I. BACKGROUND

"The IDA Pro Disassembler and Debugger is an interactive,
programmable, extendible,
muti-processor disassembler hosted on Windows or on Linux. IDA
Pro has become the
de-facto standard for the analysis of hostile code, vulnerability
research and COTS
validation (...) IDA supports debugging of x86 Windows PE files,
AMD64 Windows PE
files, and x86 Linux ELF files, either locally or remotely."

MORE AT: http://www.datarescue.com


II. DESCRIPTION

The problem exist when IDA Debugger tries to write informations about
loaded dynamic link library (when LOAD_DLL_DEBUG_EVENT /
UNLOAD_DLL_DEBUG_EVENT
occurs)

Lets look at following sample code to get a better view:

-- snip --
call a
db "KERNEL32.DLL",0
a:
call LoadLibraryA
int 3
-- snip --

Following code should return KERNEL32.DLL base stored in EAX
register.
IDA Debugger shows EAX as: "EAX=77E60000 -> kernel32.dll:77E60000"
(general registers window) - this is one of the examples.
However when loaded library name includes special format
specifiers the
vulnerability takes place, here is the vulnerable code:

(disassembly of ida.wll)
.text:012563F8 mov esi, [ebp+arg_0]
.text:012563FB push [ebp+arg_C]
.text:012563FE push dword_12A27C4
.text:01256404 push 0
.text:01256406 push ebx ; format
string
.text:01256407 lea eax, [ebp+arg_0]
.text:0125640A push eax
.text:0125640B push offset sub_12562C0
.text:01256410 call sub_011D1C78 ; parser

Where EBX contains format specifier supplied by attacker.


III. IMPACT

This vulnerability after successful exploitation can allow the
attacker to run arbitrary code in context of current user.
Of course if the exploitation was not successful IDA Debugger
will fault or IDA can freeze (100% cpu - database corruption).

Note that potencial attacker can drop "baddll" on the fly, there
are few variants.

IV. POC CODE

The POC code was released for vendor.


--
--------------------------------------------------------------------
Piotr Bania - <bania.piotr@gmail.com> - 0xCD, 0x19
Fingerprint: 413E 51C7 912E 3D4E A62A BFA4 1FF6 689F BE43 AC33
http://pb.specialised.info - Key ID: 0xBE43AC33
--------------------------------------------------------------------
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close