Pages

Iconics GENESIS32/GENESIS64 Integer Overflow Vulnerability Eleven

Vulnerability

Multiple vulnerabilities have been identified in ICONICS GENESIS32 and GENESIS64, which could be exploited by remote attackers to cause a denial of service or take complete control of a vulnerable system. These issues are caused by memory corruptions and integer overflow errors in the “GenBroker” service when processing malformed requests sent to port 38080/TCP (opcodes 0xfa7, 0xfa4, 0xdb0, 0xdae, 0x89b, 0x89a, 0x7d0, 0x4b5, 0x4b2, 0x4b0, 0×455, 0×454, 0×453, 0×451, 0×450, 0x3f0, 0x26ac, 0x1c86, 0x1c84, 0x1c24, 0x1c20, 0x1bbd, 0x1bbc, 0×1394, 0×1393, 0×1392, 0×1391, 0×1390, and 0x138f), which could allow remote unauthenticated attackers to crash an affected service or execute arbitrary code with elevated privileges.

Multiple vulnerabilities have been reported that affect services on 38080/TCP:

• Multiple integer overflow (remotely exploitable)
• Double-free memory corruption (remotely exploitable)

GenBroker is a Windows service running on port 38080.

The addresses and code snippets reported here are referred to GENESIS32 9.2.

The service is affected an integer overflow vulnerability during the handling of the opcode 0x1C84 caused by the allocation of the memory needed for the creation of an array trusting the number of elements passed by the client.

The resulting memory corruptions (like direct registry calls, memory locations calls, writing of data in arbitrary locations and so on) allow code execution.

Fields in the packet:
string
string
32
32 malloc(x * 16)

Vulnerable code:
0044CBE2 |. E8 89A5FCFF CALL 00417170 ; get 32bit
0044CBE7 |. 8B03 MOV EAX,DWORD PTR DS:[EBX]
0044CBE9 |. 3BC5 CMP EAX,EBP
0044CBEB |. 76 3C JBE SHORT 0044CC29
0044CBED |. C1E0 04 SHL EAX,4 ; * 16
0044CBF0 |. 50 PUSH EAX
0044CBF1 |. E8 C2A50500 CALL ; malloc

Affected Systems

  • All versions of GENESIS32 9.21 and older
  • All versions of GENESIS64 10.51 and older

Impact

An attacker can exploit Integer overflows to cause undefined behavior, crashes, or to execute arbitrary code and take control of a vulnerable system. Integer overflows can also result in a buffer overflow condition in which data corruption will most likely take place.

Detection

Digital Bond has not released a Quickdraw IDS Signature for this vulnerability at this time.

Remediation

There is currently no fix available.

External Links

ICS−ALERT-11-080-02 MULTIPLE VULNERABILITIES IN ICONICS GENESIS (32 & 64)