in reply to Re^2: Finding stack addresses
in thread Finding stack addresses

Why would you want to know the address of the environment variable? In any case, if you read perlguts you can see that any perl variable is implemented as a pointer to a generalized struct, so it shouldn't be too hard to get that pointer from XS code. Devel::Peek might also be useful.

updated: s/perlxs/perlguts/;

Replies are listed 'Best First'.
Re^4: Finding stack addresses
by skx (Parson) on Sep 18, 2006 at 21:14 UTC

    I could go into a lot of detail here, but I guess it would be mostly off-topic.

    However generally a successful buffer overflow attack requires two things:

    • A static buffer (keeping things simple) being overwritten such that a function return address on the stack can be modified.
    • A piece of shellcode somewhere in the processes address-space.

    Once you've written past the end of the buffer to be overflowed, and modified the saved "return address" value you want to write the address of your shellcode there. The net result is that once the buffer is overflown your own code gets executed, and you win!

    Traditionally this is done by saving the code to execute in an environmental variable - which will exist in all processes spawned by a parent shell, and which won't move around.

    So the process becomes:

    • run /bin/sh
    • setup the $EGG variable via "export EGG=shellcode..." (remember that environmental variables can contain binary data)
    • Construct an overly long argument/parameter/fileinputand feed it to your vulnerable program - attempting to cause the overritten return address/EIP to be set to getenv( "EGG")
    • Profit!

    Or you could cheat and use a pre-made tool to do all the work ..

    Steve
    --