SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow
Title: SAS Integration Technologies Client 9.31_M1 (SASspk.dll) Stack-based Overflow
Advisory ID: ZSL-2013-5142
Type: Local/Remote
Impact: System Access, DoS
Risk: (4/5)
Release Date: 25.05.2013
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
SAS Integration Technologies Client 9.31_M1
Microsoft Windows 7 Enterprise EN (32/64bit)
[20.04.2013] Contact with the vendor.
[01.05.2013] Vendor responds asking more details.
[01.05.2013] Sent details to the vendor.
[09.05.2013] Vendor confirms the vulnerability, working on a fix.
[17.05.2013] Vendor releases a hotfix for this issue.
[25.05.2013] Coordinated public security advisory released.
[2] http://ftp.sas.com/techsup/download/hotfix/HF2/I58.html#49961
[3] http://support.sas.com/documentation/cdl/en/itechov/62757/HTML/default/viewer.htm#titlepage.htm
[4] http://packetstormsecurity.com/files/121753
[5] http://cxsecurity.com/issue/WLB-2013050185
[6] http://www.exploit-db.com/exploits/25714
[7] http://www.vfocus.net/art/20130527/10874.html
[8] http://osvdb.org/show/osvdb/94009
[9] http://www.tenable.com/plugins/index.php?view=single&id=67129
[26.05.2013] - Added reference [6]
[30.05.2013] - Added reference [7]
[08.06.2013] - Added reference [8]
[15.11.2013] - Added reference [9]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2013-5142
Type: Local/Remote
Impact: System Access, DoS
Risk: (4/5)
Release Date: 25.05.2013
Summary
SAS Integration Technologies provides you with software that enables you to build a secure client/server infrastructure on which to implement SAS distributed processing solutions. With SAS Integration Technologies, you can integrate SAS with other applications in your enterprise; provide proactive delivery of information from SAS throughout the enterprise; extend the capabilities of SAS to meet your organization's specific needs; and develop your own distributed applications that leverage the analytic and reporting powers of SAS. The SAS Deployment Manager is used for post-installation configuration tasks such as configuring some products, applying hot fixes, updating metadata, and uninstalling SAS software.Description
The SASspk module (SASspk.dll) version 9.310.0.11307, has a function called 'RetrieveBinaryFile()' which has one parameter called 'bstrFileName' which takes arguments as strings as defined in the function itself as ISPKBinaryFile from the SASPackageRetrieve library. Stack-based buffer overflow was discovered in one of the fuzzing processes that could allow arbitrary code execution by an attacker when exploiting the non-sanitized 'bstrFileName' parameter.--------------------------------------------------------------------------------
ArgDump:
--------------------------------------------------
EBP+8 007EA404 -> Uni: AAAAAAAAAAAAAAAAAAAAAAAAA
EBP+12 0016EB30 -> 00000000
EBP+16 00940E68 -> BAADF00D
EBP+20 41414141
EBP+24 41414141
EBP+28 41414141
Stack Dump:
--------------------------------------------------
1699E0 60 0E 94 00 00 00 00 00 01 00 00 00 60 0E 94 00 [`...........`...]
1699F0 30 28 00 00 00 00 00 00 00 00 00 00 E4 EA 16 00 [................]
169A00 33 DF 4D 00 04 A4 7E 00 30 EB 16 00 68 0E 94 00 [..M.........h...]
169A10 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]
169A20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [................]
--------------------------------------------------------------------------------
Vendor
SAS Institute Inc. - http://www.sas.comAffected Version
Deployment Manager 9.3.0.0 (Model 12.05, TS1M2)SAS Integration Technologies Client 9.31_M1
Tested On
Microsoft Windows 7 Ultimate SP1 EN (32/64bit)Microsoft Windows 7 Enterprise EN (32/64bit)
Vendor Status
[19.04.2013] Vulnerability discovered.[20.04.2013] Contact with the vendor.
[01.05.2013] Vendor responds asking more details.
[01.05.2013] Sent details to the vendor.
[09.05.2013] Vendor confirms the vulnerability, working on a fix.
[17.05.2013] Vendor releases a hotfix for this issue.
[25.05.2013] Coordinated public security advisory released.
PoC
sasitclient_bof.htmlCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://support.sas.com/kb/49/961.html[2] http://ftp.sas.com/techsup/download/hotfix/HF2/I58.html#49961
[3] http://support.sas.com/documentation/cdl/en/itechov/62757/HTML/default/viewer.htm#titlepage.htm
[4] http://packetstormsecurity.com/files/121753
[5] http://cxsecurity.com/issue/WLB-2013050185
[6] http://www.exploit-db.com/exploits/25714
[7] http://www.vfocus.net/art/20130527/10874.html
[8] http://osvdb.org/show/osvdb/94009
[9] http://www.tenable.com/plugins/index.php?view=single&id=67129
Changelog
[25.05.2013] - Initial release[26.05.2013] - Added reference [6]
[30.05.2013] - Added reference [7]
[08.06.2013] - Added reference [8]
[15.11.2013] - Added reference [9]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk