1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 |
####################################################################### Luigi Auriemma Application:Novell GroupWise Messenger http://www.novell.com/products/groupwise/ Versions: <= 2.1.0 Platforms:Windows, Linux, NetWare Bug:write4 Exploitation: remote, versus server Date: 16 Feb 2012 (found 10 May 2011) Author: Luigi Auriemma e-mail: aluigi@autistici.org web:aluigi.org ####################################################################### 1) Introduction 2) Bug 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== Check vendor's homepage and version because this is an old advisory. ####################################################################### ====== 2) Bug ====== nmma.exe is a service running on port 8300. The protocol is composed by fields that have particular types, for example 10 for strings or 8 for integers and so on like any RPC protocol. Through the "createsearch" command sent from a valid account and a type 9 value is possible to write a 0x00000000 in an arbitrary memory location: 00496E2A|> 8B5D 0C/MOV EBX,DWORD PTR SS:[EBP+C] 00496E2D|> 8B4D F8 MOV ECX,DWORD PTR SS:[EBP-8] 00496E30|. 8A47 06|MOV AL,BYTE PTR DS:[EDI+6] 00496E33|. 81E1 FFFF0000|AND ECX,0FFFF 00496E39|. 3C 02|CMP AL,2 00496E3B|. 8B5C8B 04|MOV EBX,DWORD PTR DS:[EBX+ECX*4+4] ... 00496F3A|. C703 00000000|MOV DWORD PTR DS:[EBX],0 ; EBX is controlled 00496F40|. 83C3 04|ADD EBX,4 00496F43|. 53 |PUSH EBX 00496F44|. 6A 20|PUSH 20 00496F46|. E8 5541F9FF|CALL nmma.0042B0A0 Seems that this vulnerability can be reached only with a valid account. In my PoC I have used a pre-build admin::adminpass account so remember to change the NM_A_PARM1 field if you want to use another one. ####################################################################### =========== 3) The Code =========== http://aluigi.org/poc/nmma_x.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18488.zip (nmma_x.zip) nmma_x 3 SERVER ####################################################################### ====== 4) Fix ====== No fix. ####################################################################### |