首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DATAC RealWin Multiple Vulnerabilities
来源:http://aluigi.org 作者:Luigi 发布时间:2011-03-23  

Sources:
http://aluigi.org/adv/realwin_2-adv.txt
http://aluigi.org/adv/realwin_3-adv.txt
http://aluigi.org/adv/realwin_4-adv.txt
http://aluigi.org/adv/realwin_5-adv.txt
http://aluigi.org/adv/realwin_6-adv.txt
http://aluigi.org/adv/realwin_7-adv.txt
http://aluigi.org/adv/realwin_8-adv.txt

Advisory Archive: http://www.exploit-db.com/sploits/datac_realwin_adv.tar.gz
PoC Archive: http://www.exploit-db.com/sploits/datac_realwin_poc.tar.gz

#######################################################################

                             Luigi Auriemma

Application:  DATAC RealWin
              http://www.dataconline.com/software/realwin.php
              http://www.realflex.com
Versions:     <= 2.1 (Build 6.1.10.10)
Platforms:    Windows
Date:         21 Mar 2011 (found 25 Nov 2010)
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    aluigi.org

===============
Introduction
===============

"RealWin is a SCADA server package for medium / small applications."

#######################################################################

Remote Stack Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to a buffer
overflow happening in the function 004be510 that splits the input
strings using some delimiters passed by the callee functions and copies
them in a stack buffer of 1024 bytes.

One of the ways to exploit the vulnerability in that function is
through an On_FC_CONNECT_FCS_LOGIN packet containing a long username.


#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_2.zip
http://www.exploit-db.com/sploits/realwin_2.zip

  nc SERVER 910 < realwin_2.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======


The part of the server listening on port 910 is vulnerable to some
buffer overflows happening during the handling of the
On_FC_CTAGLIST_FCS_CADDTAG, On_FC_CTAGLIST_FCS_CDELTAG and
On_FC_CTAGLIST_FCS_ADDTAGMS packets where the input strings are copied
in a stack buffer of 1024 bytes.

The bugs are located in different functions but I have grouped them in
this same advisory because the format and the performed operations are
similar.

List of the vulnerable functions:
- realwin_3a: 0042f770
- realwin_3b: 0042f670
- realwin_3c: 0042f9c0

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_3.zip
http://www.exploit-db.com/sploits/realwin_3.zip

  nc SERVER 910 < realwin_3?.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to a buffer
overflow happening during the handling of the
On_FC_RFUSER_FCS_LOGIN packet by the function 00437500 where the input
username is copied in a stack buffer of 44 bytes.

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_4.zip
http://www.exploit-db.com/sploits/realwin_4.zip

  nc SERVER 910 < realwin_4.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to some
buffer overflows happening during the handling of various
On_FC_BINFILE_FCS_*FILE packets in which is available a string
containing a filename used for performing some operations.
This filename is appended in a stack buffer of 256 bytes for building
the full path of a file through function 004275b0 causing the overflow.

The bugs are located in different functions but I have grouped them in
this same advisory because the format and the performed operations are
similar.

List of the vulnerable functions:
- realwin_5a: 0042f770
- realwin_5b: 0042f670
- realwin_5c: 0042f9c0 -> 0042f770
- realwin_5d: 00427790
- realwin_5e: 004280b0
- realwin_5f: 00427880

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_5.zip
http://www.exploit-db.com/sploits/realwin_5.zip

  nc SERVER 910 < realwin_5?.dat

#######################################################################

Remote Integer Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to some
buffer overflows happening during the handling of the
On_FC_MISC_FCS_MSGBROADCAST and On_FC_MISC_FCS_MSGSEND packets where is
allocated an amount of memory equal to the 32bit size value provided by
the client plus 0x16 resulting in a heap overflow during the subsequent
copy of the input data.

The bugs are located in different functions but I have grouped them in
this same advisory because the format and the performed operations are
enough similar (the main difference is the presence of the 16bit value
at offset 0x12 of On_FC_MISC_FCS_MSGSEND).

List of the vulnerable functions:
- realwin_6a: 004326f0
- realwin_6b: 00432ae0

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_6.zip
http://www.exploit-db.com/sploits/realwin_6.zip

  nc SERVER 910 < realwin_6?.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to a buffer
overflow happening during the handling of the
On_FC_CGETTAG_FCS_GETTELEMETRY, On_FC_CGETTAG_FCS_GETCHANNELTELEMETRY,
On_FC_CGETTAG_FCS_SETTELEMETRY and
On_FC_CGETTAG_FCS_SETCHANNELTELEMETRY packets where the input string is
used for building a file path on a stack buffer of about 200 bytes:

  sprintf(
    stack_buffer,
    "C:\\Program Files\\DATAC\\Real.Win\\DemoRW-1.06\\\\realflex\\data\\crt\\fwd\\tel\\%s.tel",
    input_string);

Note that the bugs are located in different functions but I have
grouped them here because the format and the performed operations are
similar.

List of the vulnerable functions:
- realwin_7a: 00467050
- realwin_7b: 00467520
- realwin_7c: 00467860
- realwin_7d: 00467ce0

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_7.zip
http://www.exploit-db.com/sploits/realwin_7.zip

  nc SERVER 910 < realwin_7?.dat

#######################################################################

Remote Stack Overflow:

======
Bug
======

The part of the server listening on port 910 is vulnerable to a buffer
overflow happening during the handling of the
On_FC_SCRIPT_FCS_STARTPROG packets by the function 00439620 where the
input string is copied in a stack buffer of about 4 kilobytes.

#######################################################################

===========
The Code
===========

http://aluigi.org/poc/realwin_8.zip
http://www.exploit-db.com/sploits/realwin_8.zip

  nc SERVER 910 < realwin_8.dat

#######################################################################

======
Fix
======

No fix.

#######################################################################


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·7-Technologies IGSS 9.00.00.11
·Iconics GENESIS32 and GENESIS6
·Symantec LiveUpdate Administra
·Siemens Tecnomatix FactoryLink
·Adobe Flash Player AVM Bytecod
·HP OpenView NNM nnmRptConfig n
·Audio Editor Pro 5.0 Buffer Ov
·HP NNM CGI webappmon.exe OvJav
·Novell Netware 6.5 SP8 Remote
·Distributed Ruby send syscall
·VMCPlayer 1.0 Denial of Servic
·IGSS 8 ODBC Server Multiple Re
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved