what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Wintercore Advisory WM01-0109

Wintercore Advisory WM01-0109
Posted Jan 21, 2009
Authored by Ruben Santamarta | Site wintercore.com

Wintercore Advisory - PXEService.exe is prone to a remote buffer overflow due to improper bounds checking when handling PXE requests. A remote unauthenticated malicious attacker can take advantage of this flaw to execute arbitrary code by sending a specially crafted UDP packet. SystemcastWizard Lite versions 2.0 and below are affected.

tags | advisory, remote, overflow, arbitrary, udp
SHA-256 | 1e4e1fc447fa7a1d81f5dee9dc92ca06a9dc682581918bf7809c0defad38df4b

Wintercore Advisory WM01-0109

Change Mirror Download

[ Wintercore Research:: Advisory W01-0109 ]

html version: https://www.wintercore.com/advisories/advisory_W010109.html

1. Background

"SystemcastWizard Lite is support software for the setup of the
PRIMEQUEST system"

2. Non-technical description

PXEService.exe is prone to a remote buffer overflow due to improper
bounds checking when handling PXE requests.

A remote unauthenticated malicious attacker can take advantage of this
flaw to execute arbitrary code by sending a specially crafted UDP packet.

3. Technical Description.

PXEService listens for PXE protocol Request. Incoming packets are copied
into a fixed buffer of 0x400 bytes. However the argument passed in to
"recvfrom()" as len is 0x5DC, therefore if an attacker is able to send a
specially crafted upd packet which exceeds that fixed length (0x400), an
overflow condition will occur. With enough crafting, an attacker can
take advantage of this flaw to execute arbitrary code on affected systems.


V4.0L11
MD5: 0C18CC97F02844445C805BB0986D6A4E

Module: PXEService.exe (32-bit) Overflow

.text:00402789 push eax ; fromlen
.text:0040278A lea ecx, [esp+20h+from]
.text:0040278E push ecx ; from
.text:0040278F push 0 ; flags
.text:00402791 push 5DCh ; len [FLAW]
.text:00402796 push offset byte_414970 ; fixed buffer 0x400
.text:0040279B push edx ; s
.text:0040279C mov [esp+34h+fromlen], 10h
.text:004027A4 call recvfrom ; BUFFER OVERFLOW

4. Exploiting it.

The exploit is trivial.

5. References

https://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html

Advisory (English)

https://www.fujitsu.com/global/services/computing/server/primequest/downloads/

Patch

https://primeserver.fujitsu.com/primequest/products/os/windows2008.html
(Japanese)
https://primeserver.fujitsu.com/primequest/download/?from=relatedlinks
Patch (Japanese)

6. Products Affected

SystemcastWizard Lite <= 2.0

7. Credits

Vulnerability discovered and researched by Ruben Santamarta, Wintercore.

8. Disclosure Timeline

05/26/2008 - Vendor Contacted
05/29/2008 - Vendor Acknowledged.
01/16/2009 - Coordinated disclosure

--

Wintercore
C/ Isla de Salvora, 180.
28400 Collado Villalba.
Spain
Phone: +(34) 91 849 98 89
www.wintercore.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close