ConQuest DICOM Server 1.4.17d Remote Stack Buffer Overflow RCE
Title: ConQuest DICOM Server 1.4.17d Remote Stack Buffer Overflow RCE
Advisory ID: ZSL-2016-5383
Type: Local/Remote
Impact: System Access, DoS
Risk: (4/5)
Release Date: 16.12.2016
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
1.4.19beta3a
1.4.19beta3b
Microsoft Windows 7 Ultimate SP1 (EN)
Linux Ubuntu 14.04.5
Solaris 10
macOS/10.12.2
[2] https://packetstormsecurity.com/files/140190
[3] https://cxsecurity.com/issue/WLB-2016120095
[4] http://www.vfocus.net/art/20161219/13213.html
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/119843
[20.12.2016] - Added reference [1], [2], [3] and [4]
[24.12.2016] - Added reference [5]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2016-5383
Type: Local/Remote
Impact: System Access, DoS
Risk: (4/5)
Release Date: 16.12.2016
Summary
A full featured DICOM server has been developed based on the public domain UCDMC DICOM code. Some possible applications of the Conquest DICOM software are: DICOM training and testing; Demonstration image archives; Image format conversion from a scanner with DICOM network access; DICOM image slide making; DICOM image selection and (limited) editing; Automatic image forwarding and (de)compression.Description
The vulnerability is caused due to the usage of vulnerable collection of libraries that are part of DCMTK Toolkit, specifically the parser for the DICOM Upper Layer Protocol or DUL. Stack/Heap Buffer overflow/underflow can be triggered when sending and processing wrong length of ACSE data structure received over the network by the DICOM Store-SCP service. An attacker can overflow the stack and the heap of the process when sending large array of bytes to the presentation context item length segment of the DICOM standard, potentially resulting in remote code execution and/or denial of service scenario.--------------------------------------------------------------------------------
0:002> g
(820.fc4): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
*** WARNING: Unable to verify checksum for C:\Users\lqwrm\Downloads\dicomserver1419beta3b\dgate64.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Users\lqwrm\Downloads\dicomserver1419beta3b\dgate64.exe
dgate64+0xb9a29:
00000001`3fe09a29 488b5108 mov rdx,qword ptr [rcx+8] ds:42424242`4242424a=????????????????
0:002> r
rax=0000000044444444 rbx=000000000298c910 rcx=4242424242424242
rdx=000001400046001a rsi=0000000000001105 rdi=000000000041dc50
rip=000000013fe09a29 rsp=000000000298b840 rbp=000000000298e8e4
r8=000000000041dc40 r9=0000000000000402 r10=0000000000000281
r11=0000013f004a0019 r12=0000000000003eb7 r13=0000000000000000
r14=0000000000000000 r15=000000000298c910
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
dgate64+0xb9a29:
00000001`3fe09a29 488b5108 mov rdx,qword ptr [rcx+8] ds:42424242`4242424a=????????????????
0:002> u
dgate64+0xb9a29:
00000001`3fe09a29 488b5108 mov rdx,qword ptr [rcx+8]
00000001`3fe09a2d 488b4110 mov rax,qword ptr [rcx+10h]
00000001`3fe09a31 4885d2 test rdx,rdx
00000001`3fe09a34 7406 je dgate64+0xb9a3c (00000001`3fe09a3c)
00000001`3fe09a36 48894210 mov qword ptr [rdx+10h],rax
00000001`3fe09a3a eb04 jmp dgate64+0xb9a40 (00000001`3fe09a40)
00000001`3fe09a3c 48894328 mov qword ptr [rbx+28h],rax
00000001`3fe09a40 488b5110 mov rdx,qword ptr [rcx+10h]
0:002>
dgate64+0xb9a44:
00000001`3fe09a44 488b4108 mov rax,qword ptr [rcx+8]
00000001`3fe09a48 4885d2 test rdx,rdx
00000001`3fe09a4b 7406 je dgate64+0xb9a53 (00000001`3fe09a53)
00000001`3fe09a4d 48894208 mov qword ptr [rdx+8],rax
00000001`3fe09a51 eb04 jmp dgate64+0xb9a57 (00000001`3fe09a57)
00000001`3fe09a53 48894330 mov qword ptr [rbx+30h],rax
00000001`3fe09a57 ba18000000 mov edx,18h
00000001`3fe09a5c e804caf4ff call dgate64+0x6465 (00000001`3fd56465)
0:002> kb e
# RetAddr : Args to Child : Call Site
00 00000001`3fe104d2 : 00000000`00457a28 00000000`00008014 00000000`0298b8d9 00000000`00000000 : dgate64+0xb9a29
01 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : dgate64+0xc04d2
02 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
03 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
04 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
05 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
06 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
07 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
08 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
09 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
0a 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
0b 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
0c 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
0d 41414141`41414141 : 41414141`41414141 41414141`41414141 41414141`41414141 41414141`41414141 : 0x41414141`41414141
0:002> !exchain
100 stack frames, scanning for handlers...
Frame 0x01: dgate64+0xc04d2 (00000001`3fe104d2)
ehandler dgate64+0x552e (00000001`3fd5552e)
Frame 0x02: error getting module for 4141414141414141
Frame 0x03: error getting module for 4141414141414141
Frame 0x04: error getting module for 4141414141414141
Frame 0x05: error getting module for 4141414141414141
Frame 0x06: error getting module for 4141414141414141
Frame 0x07: error getting module for 4141414141414141
Frame 0x08: error getting module for 4141414141414141
Frame 0x09: error getting module for 4141414141414141
Frame 0x0a: error getting module for 4141414141414141
Frame 0x0b: error getting module for 4141414141414141
Frame 0x0c: error getting module for 4141414141414141
Frame 0x0d: error getting module for 4141414141414141
Frame 0x0e: error getting module for 4141414141414141
Frame 0x0f: error getting module for 4141414141414141
Frame 0x10: error getting module for 4141414141414141
Frame 0x11: error getting module for 4141414141414141
Frame 0x12: error getting module for 4141414141414141
Frame 0x13: error getting module for 4141414141414141
Frame 0x14: error getting module for 4141414141414141
Frame 0x15: error getting module for 4141414141414141
Frame 0x16: error getting module for 4141414141414141
...
...
Frame 0x61: error getting module for 4141414141414141
Frame 0x62: error getting module for 4141414141414141
Frame 0x63: error getting module for 4141414141414141
0:002> g
STATUS_STACK_BUFFER_OVERRUN encountered
(820.fc4): Break instruction exception - code 80000003 (first chance)
kernel32!UnhandledExceptionFilter+0x71:
00000000`7796bb21 cc int 3
0:002> g
ntdll!ZwWaitForSingleObject+0xa:
00000000`77a3bb7a c3 ret
--------------------------------------------------------------------------------
Vendor
University of Manchester. Developed by Marcel van Herk, Lambert Zijp and Jan Meinders. The Netherlands Cancer Institute - https://ingenium.home.xs4all.nl/dicom.htmlAffected Version
1.4.17d1.4.19beta3a
1.4.19beta3b
Tested On
Microsoft Windows 7 Professional SP1 (EN)Microsoft Windows 7 Ultimate SP1 (EN)
Linux Ubuntu 14.04.5
Solaris 10
macOS/10.12.2
Vendor Status
N/APoC
conquest_bof.pyCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/40927/[2] https://packetstormsecurity.com/files/140190
[3] https://cxsecurity.com/issue/WLB-2016120095
[4] http://www.vfocus.net/art/20161219/13213.html
[5] https://exchange.xforce.ibmcloud.com/vulnerabilities/119843
Changelog
[16.12.2016] - Initial release[20.12.2016] - Added reference [1], [2], [3] and [4]
[24.12.2016] - Added reference [5]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk