####################################################################### Luigi Auriemma Application: Iconics GENESIS32 and GENESIS64 http://www.iconics.com/Home/Products/HMI-and-SCADA/GENESIS32.aspx http://www.iconics.com/Home/Products/HMI-and-SCADA/GENESIS64.aspx Versions: GENESIS32 <= 9.21 GENESIS64 <= 10.51 GenBroker.exe and GenBroker64.exe are the same version on both the softwares: 9.21.201.01 Platforms: Windows Bug: integer overflow Exploitation: remote, versus server Date: 21 Mar 2011 (found 08 Jan 2011) Author: Luigi Auriemma e-mail: aluigi@autistici.org web: aluigi.org ####################################################################### 1) Introduction 2) Bug 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== Iconics Genesis is a SCADA HMI solution used worldwide with customers that go from Beijing Traffic Control Center to the Pentagon and even Poste Italiane ("Case Studies" source). Informations from the vendor's website: "GENESIS32™ is the industry’s first and only fully scalable suite of OPC, SNMP, BACnet and Web-enabled HMI and SCADA applications." ####################################################################### ====== 2) Bug ====== GenBroker is a Windows service running on port 38080. The addresses and code snippets reported here are referred to GENESIS32 9.2. The service is affected by an integer overflow vulnerability during the handling of the opcode 0x4b5 caused by the allocation of the memory needed for the creation of an array trusting the number of elements passed by the client. The resulting memory corruptions (like direct registry calls, memory locations calls, writing of data in arbitrary locations and so on) allow code execution. Fields in the packet: string string 32 32 32 malloc(x * 4) Vulnerable code: 0044C538 |. E8 33ACFCFF CALL 00417170 ; get 32bit 0044C53D |. 8B45 00 MOV EAX,DWORD PTR SS:[EBP] 0044C540 |. 85C0 TEST EAX,EAX 0044C542 |. 76 6C JBE SHORT 0044C5B0 0044C544 |. 8D1485 000000>LEA EDX,DWORD PTR DS:[EAX*4] ; * 4 0044C54B |. 52 PUSH EDX 0044C54C |. FF15 C0FF8400 CALL DWORD PTR DS:[<&ole32.CoTaskMemAlloc>] ; ole32.CoTaskMemAlloc ####################################################################### =========== 3) The Code =========== http://aluigi.org/poc/genesis_iof.zip genesis_iof 5 SERVER ####################################################################### ====== 4) Fix ====== No fix. UPDATE 08 Apr 2011: GenBroker.exe 9.22.202.11 #######################################################################