Vulnerability Development mailing list archives

Re: Ascii-x86 was: Blind Remote Buffer Overflow


From: robert.collins () ITDOMAIN COM AU (Robert Collins)
Date: Thu, 4 May 2000 10:45:26 +1000


FWIW I recall in dos there was an ability to hold down alt and use the
numeric keypad to enter charcodes directly in

ie ALT-1,2,7 resulted in ASCII 127 being sent to the application....

Rob
----- Original Message -----
From: "Bluefish" <11a () GMX NET>
To: <VULN-DEV () SECURITYFOCUS COM>
Sent: Thursday, 4 May 2000 6:06
Subject: Ascii-x86 was: Blind Remote Buffer Overflow

I've written some code earlier in my life to be possible to use with the
ms-dos copy con: file.com -feature. My opion is that for most situations
its possible without too much work. (*never rely on this being 'hard' to
do!*)

To begin with, you are rarely limited to 7bit ascii (unless your shellcode
is being filtered). In fact you can often use a whole lot of 8bit
characters. That it cannot be printed is no gaurantee, e.g. you can
sometimes supply low ascii characters using the ctrl-button.

Additionally, regarding stuff being out of range! You have to keep in mind
that severall of the jump-codes can be replaced with synonmyns. If you
can't supply a call, your attacker might use PUSH/JMP or PUSH/PUSH/RET to
simulate it etc.

I doubt any developer actually rely on this being impossible, but I just
wanted to stress the fact that a fix for a overflowable but filtered
buffert should be as important to provide fast as an unfiltered. Because
what might seem hard to do might be hard to do - but some lunitic might
stay up for 36 hours only working with the problem and a few days later
the exploit might be widely available and activly exploited.

(possible scenarios could be the old XFree86 and the Win98-LFN buffert
overflows where the attacker is limited to printable characters. Or any
computer system where you can create executables but haven't a hexeditor
or compiler to create it using the common ways...)

Cheers,
  B.F.

..:::::::::::::::::::::::::::::::::::::::::::::::::..
     http://www.11a.nu || http://bluefish.11a.nu
    eleventh alliance development & security team



Current thread: