码迷,mamicode.com
首页 > 其他好文 > 详细

don't run 'strings' on untrusted files

时间:2014-10-27 22:47:53      阅读:434      评论:0      收藏:0      [点我收藏+]

标签:des   style   blog   http   io   color   os   ar   使用   

0x00 前言: 

   reahat的官网上可以找到编号CVE-2014-8485的漏洞,描述如下:

  CVE-2014-8485 binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections()

  然而给的参考链接 MITRE CVE dictionary 和 NIST NVD都没有CVE-2014-8485的信息:Unable to find vuln CVE-2014-8485

  可以看到redhat给的评级是6.8,前段时间bash出来时为10,记得很多然都说heartbleed的评级为5来着

0x01 don‘t run ‘strings‘ on untrusted files

  截至目前,实际上还没有分配到CVE-2014-8485这个编号,推测是为将来时态。

  关于此事,最早应该是在:http://lcamtuf.blogspot.jp/2014/10/psa-dont-run-strings-on-untrusted-files.html

  FQ麻烦,copy原文如下:

  

Many shell users, and certainly most of the people working in computer forensics or other fields of information security, have a habit of running /usr/bin/strings on binary files originating from the Internet. Their understanding is that the tool simply scans the file for runs of printable characters and dumps them to stdout - something that is very unlikely to put you at any risk.

It is much less known that the Linux version of strings is an integral part of GNU binutils
, a suite of tools that specializes in the manipulation of several dozen executable formats using a bundled library called libbfd. Other well-known utilities in that suite include objdump and readelf.
Perhaps simply by the virtue of being a part of that bundle
, the strings utility tries to leverage the common libbfd infrastructure to detect supported executable formats and "optimize" the process by extracting text only from specific sections of the file. Unfortunately, the underlying library can be hardly described as safe: a quick pass with afl (and probably with any other competent fuzzer) quickly reveals a range of troubling and likely exploitable out-of-bounds crashes due to very limited range checking, say:
$ wget http://lcamtuf.coredump.cx/strings-bfd-badptr2 ... $ strings strings-bfd-badptr2 Segmentation fault ... strings
[24479]: segfault at 4141416d ip 0807a4e7 sp bf80ca60 error 4 in strings[8048000+9a000] ... while (--n_elt != 0) if ((++idx)->shdr->bfd_section) ← Read from an attacker-controlled pointer elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section; ← Write to an attacker-controlled pointer ... (gdb) p idx->shdr $1 = (Elf_Internal_Shdr *) 0x41414141
The 0x41414141 pointer being read and written by the code comes directly from that proof-of-concept file and can be freely modified by the attacker to try overwriting program control structures. Many Linux distributions ship strings without ASLR
, making potential attacks easier and more reliable - a situation reminiscent of one of the recent bugs in bash.
Interestingly
, the problems with the utility aren‘t exactly new; Tavis spotted the first signs of trouble some nine years ago.
In any case: the bottom line is that if you are used to running strings on random files, or depend on any libbfd-based tools for forensic purposes, you should probably change your habits. For strings specifically, invoking it with the -a parameter seems to inhibit the use of libbfd. Distro vendors may want to consider making the -a mode default, too.

  对于文章的结果,本地CentOS测试的确出现了段错误:

  bubuko.com,布布扣

  由于这里的段错误,SSH连接由此中断了一次

  测试文件比较小:

  bubuko.com,布布扣

0x02 分析

  目击者:binutils、_bfd_elf_setup_sections()、afllibbfd

  binutls:

  

The GNU Binutils are a collection of binary tools. The main ones are:

ld - the GNU linker.
as - the GNU assembler.
But they also include:

addr2line - Converts addresses into filenames and line numbers.
ar - A utility for creating, modifying and extracting from archives.
c++filt - Filter to demangle encoded C++ symbols.
dlltool - Creates files for building and using DLLs.
gold - A new, faster, ELF only linker, still in beta test.
gprof - Displays profiling information.
nlmconv - Converts object code into an NLM.
nm - Lists symbols from object files.
objcopy - Copies and translates object files.
objdump - Displays information from object files.
ranlib - Generates an index to the contents of an archive.
readelf - Displays information from any ELF format object file.
size - Lists the section sizes of an object or archive file.
strings - Lists printable strings from files.
strip - Discards symbols.
windmc - A Windows compatible message compiler.
windres - A compiler for Windows resource files.

  原文下面有趣的评论:

0xdeadbabeOctober 25, 2014 7:20 PM
Oh shit,

It‘s not funny when you realize that that somebody is discovering priv8 0days.
I‘ve laughed a lot for a while targeting some white-hat biatches xDDDD. Here it
goes another one related with PE file headers parsing ^_^ , indeed, I could say
that there are tons of bugs related with binary parsing in binutils ]:-D

$ strings /tmp/prueba.exe
*** stack smashing detected ***: terminated
======= Backtrace: =========
/usr/lib/libc.so.6(+0x7340e)[0x7f81ad08340e]
/usr/lib/libc.so.6(__fortify_fail+0x37)[0x7f81ad108a97]
/usr/lib/libc.so.6(__fortify_fail+0x0)[0x7f81ad108a60]
/usr/lib/libbfd-2.24.so(+0xb79a2)[0x7f81ad46f9a2]
======= Memory map: ========
00400000-00406000 r-xp 00000000 08:02 433688 /usr/bin/strings
00605000-00606000 r--p 00005000 08:02 433688 /usr/bin/strings
00606000-00607000 rw-p 00006000 08:02 433688 /usr/bin/strings
020f5000-02137000 rw-p 00000000 00:00 0 [heap]
[...]
7f81ad6b5000-7f81ad6c7000 r--p 000fd000 08:02 436332 /usr/lib/libbfd-2.24.so
7f81ad6c7000-7f81ad6cd000 rw-p 0010f000 08:02 436332 /usr/lib/libbfd-2.24.so
7fffc1e5a000-7fffc1e7c000 rw-p 00000000 00:00 0 [stack]
7fffc2000000-7fffc2002000 r-xp 00000000 00:00 0 [vdso]
7fffc2002000-7fffc2004000 r--p 00000000 00:00 0 [vvar]
ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]
Abortado (`core‘ generado)


Hey guys, do you wanna find something when fuzzing? Use as input the awesome
radare2 regression tests https://github.com/radare/radare2-regressions.

And for you Micha?, thanks for all you‘re work! Keep on it, maquina!

Viva Andalucia Libre!

  本文对此不做技术剖析,有一点值得注意:这件事情目前很冷,但是反映出的道理是类似于bash一样,这些我们熟知并使用的小工具一旦使用不当就会给自己惹麻烦,所谓安全,理论上根本不存在。

  类似问题9年前已经存在:https://bugs.gentoo.org/show_bug.cgi?id=91398

solar  gentoo-dev 2005-05-04 02:29:08 UTC
Only the first 78 bytes of the a.out matter. (head -c78 a.out)

gdb crashes here.

#0  0x081dbe78 in bfd_elf32_object_p (abfd=0x831e458) at elfcode.h:662
#1  0x081c856c in bfd_check_format_matches (abfd=0x831e458, format=bfd_object, matching=0x0) at format.c:228
#2  0x081c8324 in bfd_check_format (abfd=0x831e458, format=bfd_object) at format.c:91
#3  0x08079fd0 in exec_file_attach (filename=0xbfffe615 "a.out", from_tty=0x1) at exec.c:221
#4  0x0807e390 in do_captured_command (data=0xbfffe120) at top.c:554
#5  0x0807e2fc in do_catch_errors (uiout=0x831cdc8, data=0xbfffe0f8) at top.c:524
#6  0x0807e0a0 in catcher (func=0x807e2e0 <do_catch_errors>, func_uiout=0x831cdc8, func_args=0xbfffe0f8, func_val=0xbfffe104, func_caught=0xbfffe100, errstring=0x823e4c1 "", gdberrmsg=0x0, mask=0x6) at top.c:431
#7  0x0807e350 in catch_errors (func=0x807e36a <do_captured_command>, func_args=0xbfffe120, errstring=0x823e4c1 "", mask=0x6) at top.c:536
#8  0x0807e3dd in catch_command_errors (command=0x8079eae <exec_file_attach>, arg=0xbfffe615 "a.out", from_tty=0x1, mask=0x6) at top.c:574
#9  0x0807536d in captured_main (data=0xbfffe440) at main.c:645
#10 0x0807e2fc in do_catch_errors (uiout=0x82c8c80, data=0xbfffe3f8) at top.c:524
#11 0x0807e0a0 in catcher (func=0x807e2e0 <do_catch_errors>, func_uiout=0x82c8c80, func_args=0xbfffe3f8, func_val=0xbfffe404, func_caught=0xbfffe400, errstring=0x823a71a "", gdberrmsg=0x0, mask=0x6) at top.c:431
#12 0x0807e350 in catch_errors (func=0x80748e7 <captured_main>, func_args=0xbfffe440, errstring=0x823a71a "", mask=0x6) at top.c:536
#13 0x08075702 in gdb_main (args=0xbfffe440) at main.c:810
#14 0x080748a4 in main (argc=0x2, argv=0xbfffe4b4) at gdb.c:35

  Linux下没有ADSL,相比Windows存在易被利用之处,但较新内核中默认开启了段保护机制,总归是在不断加强自身安全性

  最后送上一张图:

 

bubuko.com,布布扣

 

don't run 'strings' on untrusted files

标签:des   style   blog   http   io   color   os   ar   使用   

原文地址:http://www.cnblogs.com/r00tgrok/p/4055339.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!