äžèŒª��BUGRAQ-JP管ç�ººã§ãã�
ãæãïŒãã®ã¡ã�»ãŒãžã¯'---cut here---'以äžãå
šæ�²èŒã�äžãç¡å¶éã«é
åž�¯èœã§ãã�
----------------------cut here------------------------------------------
rain forest puppy ã®èš±å¯ãåŸãŠä»¥äžã翻蚳ãã�ã¹ãããŸãã翻蚳è�ŒNobuo Miwa BUGTRAQ-JP moderator
--- Advisory RFP9907 ----------------------------- rfp.labs -----------
ãããªããããªãã�ãµãŒããRDSããããŠå€ãã®ã¹ã¯ãªãããã�£ãž
ããããããããããã..RDSã¢ã¿ã�¯ããå®ãã«ã¯..
------------------------------ rain forest puppy / [email protected] ---
å�®¹:
- 1. åé¡ç¹
- 2. 解決ç�
- 3. ã�ã�ãªç¶æ³�
- 4. msadc.plæ»æ��çºèŠ�
- 5. æåŸã«
- 6. åè�
-----------------------------------------------------------------------
ãããèªãæéãç¡ã��ã§ãã��
ãã�å Žåã�ã以äžã�ãã¡ã€ã«ãåé€ããŠãã ãããïŒ�
?:\Program Files\Common Files\System\Msadc\msadcs.dll
åºæ¥ãã ãæ©ãåé€ããåé¡ã ããã®RDSæ©è�ãç¡å¹ã«ããŠãã ããããããRDSã䜿ã�ããã°ä»¥äžãããèªãã æ¹ããã�§ãã�
-----------------------------------------------------------------------
----[ 1. åé¡ç¹
.gov,.mil ãã㊠microsoft.com ã§ãããWebãµãŒãã«è¢«å®³ãåããŸãããããã�RDSãåå�ã§ããä»ãæ�ãããªããšã¯ãIIS 4.0ã¯å€éšããæ¥µããŠå±éºãªç¶æ³ã«ãããšã�ããšã§ããããããMicrosoftã¯ã²ãšã€ã§ãã�ãã€ã§ããªããäžã€ã®éããããããªãªãŒã¹ããŸãããæŽã«ãåãã¢ããã€ã¶ãªãäœåºŠããªãªãŒã¹ããŸããããããŠãæªã�ã«åé¡ã�解決ãããŠã�Ÿããã�
ããã§æã��å匷ããªããã°ã�ãŸããã察çã�æ¹æ³ã�äœéããè�ãããŸããç§ãRDSã«ã€ã�Šã®Explotã³ãŒããæžã�ŠãããæŽã«ãã調ã¹ãŠã¿ãããšãããã®ã¢ããã€ã¶ãªãæäŸããããšã«ãã£ãŠãã¿ãªãããšç¥èã�å
±æãããã�šæããŸãã�
åé¡ã�åºæ¬ç�«ã¯ Jet 3.5 ãVBAã®ã·ã§ã«æ©è�ãåŒã³åºãããšãå�æ¥ãããšã«ãããŸããïŒããã�以äžã�URLã«ããRFP9901:NT ODBC remote vulnerabilities ã«æžãããŠã�ŸããïŒ�
https://wiretrip.net/rfp/p/doc.asp?id=3&iface=2
MDAC 1.5ãã€ã³ã¹ãã�ã«ãããããã©ã«ãèšå®ã�IIS 4.0ããã£ããšããŸããããã«ã¯ããªã¢ãŒãããWebãéããŠODBCã«ã¢ã¯ã»ã¹ããããã®RDSãå«ãŸããŠãã/msadc/msadcs.dllãšã�DLLãéããŠè¡ãããŸããïŒããã�ã以äžã�URLã«ãã RFP9902: RDS/IIS vulnerability and exploitã«æžãããŠã�ŸããïŒ�
https://wiretrip.net/rfp/p/doc.asp?id=1&iface=2
ããã§äºã€ã®åé¡ãããããšãå�ãããŸããæŽã«ç¬¬äžã�åé¡ç¹ããããŸããããã�(RFP9902ã«æžãããŠã�)Microsoftã®æšå¥šããŠã�察çããã€ãã¹ããããšã®åºæ¥ã� VbBusObj ãšã�ãµã³ãã«ã³ã³ãã�ãã³ããå«ããRDS SDKããã±ãŒãžã«ãã£ãŠã€ã³ã¹ãã�ã«ããããµã³ãã«ãã�ãžã«ãããŸãã�
----[ 2. 解決ç�
åé¡ã�å€ãã®å¯Ÿçãããããšãšãäœ¿çšæ¹æ³ã«ãã£ãŠå€ãã®çµ�¿åãããããããšã§ããããªããwww.microsoft.comãã�ä»ããå�æããããšãå�æ¥ãªãã£ãå�Žåã�çºã«i386çšã®ã¿ã®å
šãŠã®éèŠãªãã€ããªãã¡ã€ã«(è±èªçã®ã¿)ããã©ãŒããŠãããŸããã以äžã«åºæ¥ãã ã詳现ã«èª¬æãããŠã�ãããšæããŸãã�
-察ç� #1:
cmd.exe ãç§»åãã� (ULG ãæšå¥šããå¯Ÿçæ¹æ³�)
http://www.aviary-mag.com/News/Powerful_Exploit/ULG_Fix/ulg_fix.html
æ®å¿µãªãããã�察çã«ã¯åé¡ããããŸããmdac.pl 㯠cmd.exe ã䜿çšããããã«ãã�ãã³ãŒã�£ã³ã°ãããŠã�ŸãïŒå�Žåã«ãã£ãŠã¯command.com�ã�
ãããããããCMD.EXE ã¯ æ»æ�ãŒã«ã«ã¯å¿��ã§ã¯ãããŸããã�
ç§ã�ãã³ã³ããããªã�£ãæãããããã«ãã�æ¹æ³ã�䜿ã£ãŠã�Ÿãããå¥ã®æ¹æ³ã§æ»æ�è¡ãããšãå�æ¥ãŸããããªãè�身ã§è©Šãããšãã§ããŸããmdac.pl ã� 'cmd /c'ãšã�æ�å�ãåŒã³åºããªã�ã�«ç·šé�ãŠã¿ãŠãã ãããããªãã�ããã§ãã�'rdisk'ã®ãããªå®è¡ãã¡ã€ã«ã䜿çšããããšãå�æ¥ãŸããèŠããŠãããŠæ¬²ããããšã¯ãcmd.exeã䜿çšããªã��Žåã�ã�'copy'ã®ãããªã³ãã³ãã䜿ã�ãšã¯åºæ¥ãªããªããšã�ããšã§ãããã¡ããããã¡ã€ã«ã®ãªãã€ã¬ã¯ã·ã§ã³ã䜿ããªããªããŸãããããã¯ãcmd.exeã§ã®ã¿æäŸãããæ©è�ã�ããã§ãã�
æŽã«ç¥ããªããã°ãªããªã�ãšã¯ãcmd.exe/command.comãç§»åããŠããŸã�ãšã¯ãã�å Žãã�ãã�察çã§ãããªã�šããšã�ããšã§ãã䟵å
¥è�ç§»åå�ãç¥ã£ãŠããŸãã�圌çã�ããã䜿çšããããšãå�æ¥ãŠããŸã�ãã§ãããããŠãSystem ããã®ã¢ã¯ã»ã¹ãå�æ¥ãªã�ã�«æš©éãæžãæããŠããŸã�ãšããã�¹æ³ã§ã¯ãããŸãããæ¢ã«ãã�ä»ã�ããããããã®ã§ãã¡ãã䜿ã£ãæ¹ããã�§ãã�
-察ç� #2:
MDAC 1.5 ãã 2.0 ãžã¢ã��ã°ã¬ãŒããã� MDAC 2.0 ã� Jet 3.5 ãã Jet 3.52 ãžå€æŽããŸãã�
ããã¯ãVBA shell() ã«å¯Ÿããæ»æ�«ã¯å¹æããããŸããããããŠãããã©ã«ãã§ã¯ RDS ã¯ç¡å¹ã«ã¯åºæ¥ãŸããã� * ã�ã©ã«ãã�Jetãšã³ãžã³ã�3.52ã«ããããšã¯ãcustom handler supportã«RDS * ã«å¿åã¢ã¯ã»ã¹ãçŠæ¢ãããããã«ãMicrosoft.Jet.OLEDB.3.51*ãããã€ã * ãäœæ�ããããšãèš±å¯ããŸãã� ããããããããã�ãŸãŸã§ã¯è¯ã�¹æ³ã§ã¯ãããŸããã�
ããªãã�å°ãªããšãã� custom handler supportãæå¹ã«ããªããã°ã�ãŸãããããã�ã以äžã�ã¬ãžã¹ããªããŒã§å¯èœã§ãã�
HKEY_LOCAL_MACHINE\Software\Microsoft\DataFactory\HandlerInfo\ Keyname:
HandlerRequired Value: DWORD:1 (safe) or 0 (unsafe)
ãã�å€ãïŒã«ããã¹ãã§ããããã�æŽã«MicrosoftããæäŸãããŠã�Hotfixã®
'handsafe.exe/.reg'ã§è¡ãããŠã�ããšã§ããããã�ã以äžã�URLã«ãããŸãã�
https://wiretrip.net/rfp/bins/msadc/handsafe.exe
å®è¡ãããšãã«ã¯ãhandsafe.remã䜿çšãããŸããhandsafe.regã«ååã倿ŽããŠããããã«ã¯ãªã�¯ããŠã¬ãžã¹ããªã«æžã蟌ãããšãå�æ¥ãŸãã�
ãã�ããã«ããŠRDSæ»æ�ãé²åŸ¡ããã�šããŠããExcel,WordãããŠAccessãã¡ã€ã«ã®ããã€ã®æšéЬãå«ãã ODBCæ»æ�«ã¯åŒ±ç¹ãæã£ããŸãŸã§ããã€ãŸããããã ãã§ã¯åå�ã§ã¯ãªã�ãšã�ããšã§ãã�
-察ç� #3:
MDAC 1.5 ã� 2.1 以éã«ã¢ã��ã°ã¬ãŒããã� MDAC 2.1ãJet 3.5 ãã 匱ç¹ã®ç¡ãJet 4.0ãšã³ãžã³ã«å€æŽããŸãã�
ãããã� 3.5 ãš 4.0 ã«ã¯äºææ§ã®åé¡ããããŸããå€ãã®ãŠãŒã¶ããã®äºææ§ã®åé¡ã«ãã£ãŠã¢ã��ã°ã¬ãŒãããããããªã�§ããã�� * ã�ã©ã«ãã� Jetãšã³ãžã³ã匱ç¹ã®ç¡ã�4.0ã«å€æŽããããšã¯ãå¿åRDSã®ã¢ * ã¯ã»ã¹ãçŠæ¢ããããã« custom handler support ãèš±å¯ããŸãã�
ããããªãããcustom handlerã¯ã�ã©ã«ãã§ã¯æå¹ã«ãããŠã�Ÿãããããªãã�ãäžèšã�HandlerRequiredã¬ãžã¹ããªããŒã®å€ãïŒã«ã»ã�ããªããã°ã�ãŸããããã®çºã«ã¯ãregeditã䜿çšãããhandsafe.exe/.reg fixãå®è¡ããŸãã�
-察ç� #4:
MDAC 1.5 ã� 2.0 ãã 2.1 ãžã¢ã��ã°ã¬ãŒããã�
ããããªããè¯ã�®¡ç��§ãããªããããªãã�åžžã«ãœãããŠã§ã¢ãã¢ã��ã°ã¬ãŒããç¶ããŠã�ã§ããã�ãããã�ãŠã�ã®ãªããå�ãŠã®ã¢ã��ã°ã¬ãŒãã�éçšãéã£ãŠã�äºã§ããã��2.1
ã«çŽæ¥ã¢ã��ã°ã¬ãŒãããããšã«ã¯åé¡ããããŸãïŒäžèšã�ããã«'HandlerRequired'ã¬ãžã¹ããªããŒãæå¹ã«ããªããã°ã�ãŸãã�ã�
2.1ã¯ãããã©ã«ãã§ã¯(匱ç¹ã®ç¡ã�)Jet 4.0ãšã³ãžã³ã䜿çšããŠã�Ÿããããããªããã�2.0 ãžã®ã¢ã��ã°ã¬ãŒããè¡ããªãã£ãå�Žåã�ãMicrosoft.Jet.OLEDB.3.51ãããã€ãã䜿çšããŠã�Ÿããããã�ãRDSãå«ããã¢ããªã±ãŒã·ã§ã³ã¯å€ã�(匱ç¹ã®ãã)Jet 3.51ãšã³ãžã³ãåŒã³åºããŠã�ããšãæå³ããŸãã� ããªãã�ãããã�å€ã�šå®ãåé€ããå¿�ŠããããŸããã�ãšã€ã®æ¹æ³ã�ã以äžã�ã¬ãžã¹ããªããŒã§è¡ããŸãã�
HKEY_CLASSES_ROOT\Microsoft.Jet.OLEDB.3.51
HKEY_CLASSES_ROOT\Microsoft.Jet.OLEDB.3.51Errors
ããããªãããããªãã� 4.0ãšã³ãžã³ã®äºææ§ã®åé¡ã«çŽé¢ãããŸãŸã§ããåŸã£ãŠãããã�çŽ�æŽããã�§£æ±ºçã§ã¯ãããŸããã�
-察ç� #5:
JetCopkg.exe (MS99-030)ãã€ã³ã¹ãã�ã«ããã�
JetCopkg.exe 㯠'sandbox'ã«ä»£è¡šãããå®å�ãªæ©è�ãæã£ãŠã�ãæ»æ�ããªã�¿®åŸ©ãæœããã� Jet 3.5ãšã³ãžã³ã§ãããã®å®å�ãªæ©è�ã¯ã以äžã�ã¬ãžã¹ããªããŒã«ãã£ãŠå¶åŸ¡ãããŠã�Ÿãã�
HKEY_LOCAL_MACHINE\Software\Microsoft\Jet\3.5\engines\SandboxMode
ããããã®å€ã¯ä»¥äžã�æå³ãæã¡ãŸã�:
0 ç¡å¹
1 ã¢ã¯ã»ã¹ã®ã¿ãæå¹ã«ãã, ãã以å€ã�ç¡å¹
2 ã¢ã¯ã»ã¹ã®ã¿ãç¡å¹ã«ããããã以å€ã�æå¹�ããã©ã«ãïŒ�
3 å
šãŠæå¹
(Note 1: 'æå¹'㯠Microsoft Access ããå©çšã§ãããšã�æå³ã§ã�)
(Note 2: ãããã�以äžã�URLã«å
šãŠèšè¿°ãããŠã�Ÿã�:
http://support.microsoft.com/support/kb/articles/q239/1/04.asp)
(Note 3: ãã�ããŒã«èšå®ãããŠã�ã�ã©ã«ãã�ãã�ããã·ã§ã³ã¯å®å�ã§ã¯ãããŸãã�� ããªãã�'Authenticated Users'ãã'Read Only'ã«å€æŽããã¹ãã§ãããã®ã�ã©ã«ãã�èšå®ã«ãããå±éºæ§ã«ã€ã�Šã¯ãEric Shultzeãç§ã�ãµã€ãã«ãã¹ãšããŠããã以äžã�URLãåç
§äžãã�ïŒ�
https://wiretrip.net/rfp/p/doc.asp?id=11&iface=2
äžèšã�å€ã� 2 ã� 3 ã«ããå Žåã�å®å�ã§ããããã�é©å�ªæšå¥šãããæ¹æ³ã§ãã�
Jet 3.5ãšã³ãžã³ã䜿çšããŠã�ã®ã§äºææ§ã®åé¡ã�ãããŸãããããããããã�RDSãç¡å¹ã«ã¯ããŠã�Ÿãããæ»æ���ããªãã�ã��ã¿ãã�ã¹ã»ãªãœãŒã¹ã«å¿åã¢ã¯ã»ã¹ã§ããŸããããªãã�ã��ã¿ããã¡ã�ã¡ã�«ããããšãå�æ¥ãŸãã�
ããªãã�察çãå¿�Šã§ããç§ã�RDSãç¡å¹ã«ããã�(äžèšåç
§)ãMDAC 2.0ã«ã¢ã��ã°ã¬ãŒãããããšãæšå¥šããŸã�(ããããMDAC 2.0ãæåã«ã¢ã��ã°ã¬ãŒãããŠãããæ¬¡ã« JetCopkg ãã€ã³ã¹ãã�ã«ããŠãã ãã)ã�MDAC 2.0 ã«ã¢ã��ã°ã¬ãŒãããããšã«ãã£ãŠãå¿åã¢ã¯ã»ã¹ãç¡å¹ã«åºæ¥ããã³ãã©ã®å¶åŸ¡ãå�æ¥ããã�«ãªããŸãã�
-察ç� #6:
RDS ã®åé€/ç¡å¹
ããã¯ãäžèšã�JetCopkgãšäœµããŠè¡ãå Žåã«äžçªè¯ã�¹æ³ã§ããããããªããäœããã�ç�±(Y2K察çã�çºã®ã·ã¹ã� 倿ŽçŠæ¢)ã§ã·ã¹ã� ã倿Žãããããªã€ã³ã¹ãã�ã«ãå�æ¥ãªã��Žåã�ãããªãã�RDSãç¡å¹ã«ããããšã«ãã£ãŠãå°ãªããšããªã¢ãŒãããã�æ»æ��å±éºæ§ãæžããããšãå�æ¥ãŸããããªãã�ãããèã£ãœã�ãæ¹ã§ããã以äžã�ãã¡ã€ã«ãåé€ããããšã«ãã£ãŠå¯èœã«ãªããŸãã�
?:\Program Files\Common Files\System\Msadc\msadcs.dll
ããã¯ãRDSã€ã³ã¿ãŒãã§ãŒã¹ãæäŸããDLLã§ãããããã以äžã�ãããªæé��§ãã¡ããšå¯Ÿçãè¡ãããšãèŠããŸãã� * IISã«ãã£ãŠãããã³ã°ãããŠã�/msadcä»®æ³ã�£ã¬ã¯ããªãåé€ããŸãããããè¡ãããã«ã�
Microsoft Management Console/Internet Service Manager
ãéã�Šä»¥äžã�æäœãè¡ã£ãŠãã ããã�
* 'Internet Information Server'ãéžæ�
* é©å�ªã·ã¹ã� ãéžæ�
* 'Default Web Site'ãéžæ�
* 'msadc'ãéžæ�
* 'Del' keyãæŒããã�'delete icon'ãã¯ãªã�¯
* 'Are you sure?' 'Yes.'
* 以äžã�ã¬ãžã¹ããªããŒãåé€ããŸãã�
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W3SVC \Parameters\ADCLaunch
(Note: èŠãããããããã«æãè¿ããŠã�Ÿã�) * 以äžã�ãã©ã«ãã«å«ãŸããå
šãŠã®ãã¡ã€ã«ãšãµããã£ã¬ã¯ããªãåé€ããŸãã�
?:\Program Files\Common Files\System\Msadc
----[ 3. ã�ã�ãªç¶æ³�
-ç¶æ³� #1: RDSãå¿�Šã§ãïŒ�
ããããããã®ãããªå£°ãèãããšã¯æ®å¿µãªããšã§ããã§ã倧äžå€«ãå¯èœã§ããããªãã�ãå°ãªããšã� MDAC 2.0
ã«ã¢ã��ã°ã¬ãŒãããå¿�ŠããããŸãããããããªãããbackwards-compatibilityã®åé¡ãæ±ããŠã�ã®ã§ããã°ãMDAC 2.0 ãJetCopkgãšå
±ã«äœ¿çšããŠãã ããããã�§ãªã�ªããMDAC 2.1ã«ãã£ããšã¢ã��ã°ã¬ãŒãããã¹ãã§ãã�
'HandlerRequired'ã¬ãžã¹ããªããŒãæå¹ã«ãªã£ãŠã�ããšã確èªããŠäžãã�ãŸããRDSã®ãµã³ãã«ãåé€ãããŠã�ããšã確èªããŠäžãã��
Microsoftã¯æŽã«MMC以äžã�ã�ã©ã«ã�Webãµã€ãã� /msadcã�£ã¬ã¯ããªã®å¿åã¢ã¯ã»ã¹ãç¡å¹ã«ããããšãæšå¥šããŠã�Ÿããããã«ã¯ custom handler ã䜿çšããããšã«ãªããŸãããããã®æ��±ã¯ã以äžã�URLã«ãããŸãã�
http://www.microsoft.com/Data/ado/rds/custhand.htm
-ç¶æ³� #2: ãµã³ãã«ãã¡ã€ã«ã®åé€ä»¥å€ã�ã·ã¹ã� ã®æŽæ°ãçŠæ¢ãããŠã�Ÿãã�
éèŠãªæ��±ã§ãã� custom handlersã䜿ã�ãšã¯ RDSå
šäœã䜿çšäžè�ã«ããããšç¡ãã«
RDS ãžã®å¿åã¢ã¯ã»ã¹ãé²ãå¯äžã®æ¹æ³ã§ããããããRDSã®ãµã³ãã«ã以äžã«ããã°ã� ?:\Program Files\Common
Files\System\Msadc\Samples VbBusObjãå«ããµã³ãã«ãã¡ã€ã«ã¯custom handlersããã€ãã¹ããŠäœ¿çšããããšãå�æ¥ãŠããŸã��ã§ãïŒãåŸã£ãŠããã®ãããªãµã³ãã«ãã¡ã€ã«ãåçšã®ãµãŒãã«ååšããŠã�ç�±ã¯ã©ãã«ãç¡ã��ã§ãããããŠãããã�åé€ãããã¹ãã§ããæé ��以äžã�éãã§ãã�
* 以äžã�ã�£ã¬ã¯ããªä»¥äžãå
šãŠåé€ããŸãã�
?:\Progam Files\Comman Files\System\Msadc\Samples
* 以äžã�ã¬ãžã¹ããªããŒãåé€ããŸãã�
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W3SVC
\Parameters\ADCLaunch\VbBusObj.VbBusObjCls
ããã«ãããVbBusObjã¯åé€ãããŸãããããŠãããªãã�custom handlersããã€ãã¹ãããããšãé²ããŸãã�
----[ 4. msadc.plæ»æ��çºèŠ�
msadc.plã®version 1ãš2ã«ããæ»æ�çºèŠããããšã¯å°é£ã§ã¯ãããŸããããã®æ»æ��ä»ã§ãè¡ãããŠã�ãšæããŸãããæ®å¿µãªãããæ¹é�ã容æãªã®ã§ããã®å Žåã�æ€ç¥ã¯å°é£ã�ãšæããŸããç§ããããæžã�ãšãã«ã¯ã匱ç¹ãæŽãããšã«å°å¿µããŠã�Ÿããã�
msadc.pl ã¯ãæåã«ãã¿ãŒã²ã�ãµãŒãã�/msadc/msadcs.dllãGETããã�šããŸããããããããååšããå Žåã«ã¯ãããè¡ãããååšããªã��Žåã«ã¯ãšã©ãŒã¡ã�»ãŒãžãšå
±ã«çµäº�ãŸãããã®æåã�GETã¯ããã®åºŠã«ããªãã�ãµãŒãã�ãã°ã«æ®ãã§ããã�ãããããã®GETãHEADãPOSTã«å€æŽãããããªã¹ãã«ãæã£ãæ»æ��ã�ã§ããã�ããã«ãhex-encodingããURLã®ããã«çè·¡ã®æ®ãã«ããæ»æ�è¡ãããšãå�æ¥ãã§ããã�ããããããã§ããã°ã«ã¯æ®ããŸãã�
倧äºãªäºã�ãmsadcs.dll ããã©ã¡ãŒã¿ç¡ãã§åŒã³åºããšã�ããšã¯ã誰ããèŠãŠã¯ã�ã�(ãŸã�)䜿ã£ãŠã¯ã�ªã�ãšãæå³ããŸããRDS ãšã�ãã�ã¯ã誰ãèŠãŠã�ã�ãããšã�ããšã¯ç¡ããæ£ãããŠãŒã¶ã¯ããã«ãããå©çšããŸããåŸã£ãŠããã©ã¡ãŒã¿ç¡ãã§åŒã³åºããŠèŠãŠã�ã�ããšã�ã®ã¯ãæªããããšã�ããšã«ãªããŸãã�
ãããmsadcs.dllãååšããã°(ããã¯ã¬ã¹ãã³ã¹ããå�ããŸã�)ãã³ãã³ããèµ°ããããã�«èŠæ±ããŸããããã©ã«ãã§ã¯ãmsadc.pl 㯠'cmd /c' ã� 'command /c' (äºææ§ã®ããã«)ãå®è¡ãããã�šããŸããããã�ãcmd.exe ã� command.com ã®ååšã«äŸåããŠã�ããšãæå³ããŸããããããªããããã®ã©ã¡ãã§ããªã�ã®ãåŒã³åºãããšãå�æ¥ãã�ã§ãã� 以äžã�ã¹ã¯ãªããã¯RDSã®èŠæ±ãããŸãã�
以äžã�URLã®ã©ããã«POSTèŠæ±ãè¡ããŸãã� éåžžã®èŠæ±�:
/msadc/msadcs.dll/ActiveDataFactory.Query custom handlersããã€ãã¹ãããããã�VbBusObj:
/msadc/msadcs.dll/VbBusObj.VbBusObjCls.GetRecordset NetBIOSåãèŠæ±ããVbBusObj:
/msadc/msadcs.dll/VbBusObj.VbBusObjCls.GetMachineName
çŸåšãããããªããåçç�ªç®ç�§RDSãå©çšããŠã�ãªãã� ActiveDataFactory.QueryURLãå©çšããŠã�ã§ããã�ããããVbBusObjã¯äžèŠãªã¯ãã§ããåŸã£ãŠäžèšã�äºã€ã®URLã¯æ»æ�šèŠãªããŠã�ã¯ãã§ãã�
ããã� 'VbBusObj'ãgrepçã§æ€çŽ¢ããããšã¯æ£ããçºèŠæ¹æ³ã§ã¯ãããŸãããäŸãã°ã以äžã�ããã«hex-encodeåºæ¥ãããã§ãã�
/%6Dsadc/%6Dsadcs.dll/V%62BusO%62j.V%62BusO%62jCls.GetRecordset (ããã¯ã»ãã�äžäŸã§ã�)
ããã§ã¯æ�å�æ€çŽ¢ããããšã¯åºæ¥ãŸããããåŸã£ãŠãæåå�æ€çŽ¢ã¯åœ¹ã«ç«ã¡ãŸããã�
æŽã«äºã€ã®ããšãä»ãå�ããŠãããããšæããŸãã�
* ã�ã©ã«ãã�msadc.plã¹ã¯ãªããã¯'ACTIVEDATA'ãUser-Agenã«äœ¿çšããŠã�Ÿããããã�ãã�ã¹ã¯ãªããã«ããæ»æ�èªèããå©ãã«ãªããšæããŸããã�åžžã®RDSã³ã³ãããŒã«ããã®User-Agentã䜿çšããŸããåŸã£ãŠã�åžžã®ãã©ãã£ã�¯ã®äžãããããæ¢ãå�ãã�ã¯å°é£ã§ããã��
* ã�ã©ã«ãã�msadc.plã¹ã¯ãªããã¯MIMEã®ã»ãã¬ãŒã¿ã«'!ADM!ROX!YOUR!WORLD!'ã䜿çšããŠã�Ÿããããããããã�ãã°ã«ã¯æ®ãããŸããããããã€ãã�䟵å
¥æ€ç¥ã·ã¹ã� ã§ã¯ãããããŒã¯ãŒãã«æ€ç¥ããããšãå¯èœã§ãã�
ã�ã©ã«ãã§ã¯msadc.plã¹ã¯ãªããã¯ãµãŒãã§èŠã€ãã£ãããŒã«ã«ã®.MDBãã¡ã€ã«ãå©çšããã�šããŸãããããããèŠã€ãã£ããªãã�.MDBãã¡ã€ã«ã«'AZZ'ãšã�ååã®ã��ãã«ãäœæ�ããã§ããã�ãã®ã��ãã«ã¯æ»æ��åŸã§ãæ¶ããŸããã�
ããããmsadc.plã®version 2 ã§ã¯'AZZ'ã��ãã«ãäœããªã�¯ãšãªãå©çšããããšãå�æ¥ãŸãããããŠãããŒã«ã«ã®.MDBãããå©çšããªã�ãšãå¯èœã«ãªã£ãŠã�Ÿã�(UNCããµãã�ãããŠã�Ÿã�)ã�
----[ 5. æåŸã«
ãã�ã¢ããã€ã¶ãªããããªãæ¹ã®çºã«å€ãå¯ãªã�§æžã�Šã�ãšãã«ãä»ã�éèŠãªããšãæžãããã«ãããäžæããªããã°ãªããªããªããŸããã�
ããªããRDSã«ãã£ãŠæ»æ�ããããšãç¥ãæãè¯ã�¹æ³ã�ã以äžã�URLã«ç€ºãããŠã�Ÿãã�
https://wiretrip.net/rfp/
ãããªã«é£ããããšã§ã¯ãããŸãããæäœéãäžèšã�ãã¡ã€ã«ãåé€ããã°ããªãã�ããŸããŸãå®å�ã§ããããã§Webãµã€ããã¡ãã£ã¯ãã£ã«ãããå¿��ã¯ãªããªããŸãã�
é²ãã§ããããå
�ŠãŸããã�� .rain.forest.puppyãã
PS.ç§ãæ®éã�人éã§ããåŸã£ãŠããã®ããã¥ã¡ã³ãã«ãééãããããããããŸããããããããã�²ããŸããããã®ããšããéæŸããããã®ã§ããééãããã£ãŠãèš±ããŠãã ããã�
èš³è�³š�ç§ã�翻蚳ã«èŽåœç�ªééã�ãã£ãå�Žåã«ã¯é£çµ¡ããŠãã ããã�
----[ 6. åè�
- Office 97/Jet 3.5 update binary
(i386) https://wiretrip.net/rfp/bins/msadc/jetcopkg.exe
http://officeupdate.microsoft.com/isapi/gooffupd.asp
?TARGET=/downloaditems/JetCopkg.exe - Microsoft Universal Data Access homepage
http://www.microsoft.com/data/ - MDAC 2.1.2.4202.3 (GA) (aka MDAC 2.1 sp2)
update (i386) https://wiretrip.net/rfp/bins/msadc/mdac_typ.exe
http://www.microsoft.com/data/download_21242023.htm - MDAC 2.1.1.3711.11 (GA)
(aka MDAC 2.1 sp1) hotfix http://www.microsoft.com/data/download/jetODBC.exe -
MDAC 2.1 release manifest
http://www.microsoft.com/data/MDAC21info/MDAC21sp2manifest.htm - MDAC 2.1
installation FAQ http://www.microsoft.com/data/MDAC21info/MDACinstQ.htm -
Security Implications of RDS 1.5, IIS 3.0 or 4.0, and ODBC
http://support.microsoft.com/support/kb/articles/q184/3/75.asp - Unauthorized
ODBC Data Access with IIS and RDS (MS99-004)
http://www.microsoft.com/security/bulletins/ms98-004.asp
- Re-release of MS99-004 (MS99-025)
http://www.microsoft.com/security/bulletins/ms99-025.asp
-MS99-025 FAQ (best explanation of problem by Microsoft)
http://www.microsoft.com/security/bulletins/MS99-025faq.asp
-MS99-30: Patch available for Office ODBC Vulnerabilities
http://www.microsoft.com/security/bulletins/ms99-030.asp
-Jet Expression Can
Execute Unsafe VBA Functions
http://support.microsoft.com/support/kb/articles/q239/1/04.asp
-Implementing Custom Handlers in RDS 2.0
http://www.microsoft.com/Data/ado/rds/custhand.htm
-Handsafe registry patch (enables handlers)
https://wiretrip.net/rfp/bins/msadc/handsafe.exe
http://www.microsoft.com/security/bulletins/handsafe.exe
-RFP9901: NT ODBC remote compromise
https://wiretrip.net/rfp/p/doc.asp?id=3&iface=2
-RFP9902: RDS/IIS 4.0 vulnerability and exploit
https://wiretrip.net/rfp/p/doc.asp?id=1&iface=2
-RDS exploit (msadc.pl v1 and v2)
https://wiretrip.net/rfp/p/doc.asp?id=16&iface=2
-ULG recommended fix on OSALL
http://www.aviary-mag.com/News/Powerful_Exploit/ULG_Fix/ulg_fix.html
-CERT blurb
http://www.cert.org/current/current_activity.html#0
-Attrition mirror of defaced websites (patch or you'll be on it!)
http://www.attrition.org/mirror/attrition/
--- rain forest puppy / [email protected] -----------ADM / wiretrip
--- Patch your system before flipper and fuqnut get to you...
--- Advisory RFP9907 ----------------------------- rfp.labs -----------