/Windows Heartbleed OOB Read/heartbleed_example.c

https://github.com/atxsinn3r/VulnCases · C · 159 lines · 122 code · 19 blank · 18 comment · 19 complexity · 5dea0a5a7121736f6fda25219abb8d80 MD5 · raw file

  1. /*
  2. by _sinn3r
  3. This program mimics the famous heartbleed vulnerability.
  4. To compile:
  5. cl.exe /MT heartbleed_example.c
  6. On the client side, send the packet in this format:
  7. [Type][Payload Length][Payload]
  8. where:
  9. - Type is a char (1 byte). Type 0x01 gets you the heartbleed-like bug.
  10. - Payload length is an unsigned short (2 bytes)
  11. - Payload is an array of characters (size depends on your payload length)
  12. */
  13. #define WIN32_LEAN_AND_MEAN
  14. #include <Windows.h>
  15. #include <Ws2tcpip.h>
  16. #include <Winsock2.h>
  17. #include <stdio.h>
  18. #define DEFAULT_RECV_BUFFER_LEN 512
  19. #define PORT 4444
  20. #define REQ_READ 0x01
  21. #pragma comment(lib, "Ws2_32.lib")
  22. SOCKET serverSocket;
  23. struct addrinfo* addrResult;
  24. struct addrinfo* InitWinsock() {
  25. WSADATA wsaData;
  26. int iResult = WSAStartup(MAKEWORD(2, 2), &wsaData);
  27. if (iResult !=0 ) {
  28. return NULL;
  29. }
  30. struct addrinfo hints;
  31. ZeroMemory(&hints, sizeof(hints));
  32. hints.ai_family = AF_INET;
  33. hints.ai_socktype = SOCK_STREAM;
  34. hints.ai_protocol = IPPROTO_TCP;
  35. hints.ai_flags = AI_PASSIVE;
  36. struct addrinfo *addrResult = NULL;
  37. iResult = getaddrinfo(NULL, "4444", &hints, &addrResult);
  38. if (iResult != 0) {
  39. WSACleanup();
  40. return NULL;
  41. }
  42. return addrResult;
  43. }
  44. SOCKET CreateSocket(struct addrinfo* addrResult) {
  45. SOCKET s = socket(addrResult->ai_family, addrResult->ai_socktype, addrResult->ai_protocol);
  46. if (s == INVALID_SOCKET) {
  47. freeaddrinfo(addrResult);
  48. WSACleanup();
  49. return -1;
  50. }
  51. int iResult = bind(s, addrResult->ai_addr, (int) addrResult->ai_addrlen);
  52. if (iResult == SOCKET_ERROR) {
  53. freeaddrinfo(addrResult);
  54. closesocket(s);
  55. return -1;
  56. }
  57. return s;
  58. }
  59. int Listen() {
  60. printf("- Listening on port %d\n", PORT);
  61. int iResult = listen(serverSocket, SOMAXCONN);
  62. if (iResult == SOCKET_ERROR) {
  63. return -1;
  64. }
  65. return 1;
  66. }
  67. VOID ClientRequestHandler(SOCKET clientSocket, SOCKADDR_IN clientInfo, BYTE packet[]) {
  68. unsigned char type = *(unsigned char*)&packet[0];
  69. switch (type) {
  70. case REQ_READ:
  71. unsigned short packetLen = htons(*(unsigned short*)&packet[1]);
  72. packet += (sizeof(unsigned char) + sizeof(unsigned short));
  73. char* payload = (char*) malloc(packetLen+1);
  74. //printf("- Payload address: %p\n", payload);
  75. memcpy(payload, packet, packetLen);
  76. payload[packetLen] = '\0';
  77. send(clientSocket, payload, packetLen, MSG_DONTROUTE);
  78. printf("- Returned %d bytes\n", packetLen);
  79. free(payload);
  80. payload = NULL;
  81. break;
  82. default:
  83. send(clientSocket, "OK\n", 3, MSG_DONTROUTE);
  84. break;
  85. }
  86. }
  87. VOID ReceiveClientMessages(SOCKET clientSocket, SOCKADDR_IN clientInfo) {
  88. BYTE recvBuffer[DEFAULT_RECV_BUFFER_LEN+1];
  89. unsigned int recvBufferLen = DEFAULT_RECV_BUFFER_LEN;
  90. unsigned int bytesRead = 0;
  91. do {
  92. // recv() will complete when the input ends with \r\d
  93. bytesRead = recv(clientSocket, recvBuffer, recvBufferLen, MSG_PEEK);
  94. if (bytesRead > 0) {
  95. recvBuffer[bytesRead] = '\0';
  96. ClientRequestHandler(clientSocket, clientInfo, recvBuffer);
  97. bytesRead = 0;
  98. }
  99. } while (bytesRead > 0);
  100. }
  101. VOID AcceptConnection() {
  102. printf("- Ready to accept a connection\r\n");
  103. SOCKADDR_IN clientInfo;
  104. int clientInfoLen = sizeof(clientInfo);
  105. SOCKET clientSocket = accept(serverSocket, (SOCKADDR*) &clientInfo, &clientInfoLen);
  106. PCSTR ip = inet_ntoa(clientInfo.sin_addr);
  107. if (clientSocket == INVALID_SOCKET) {
  108. return;
  109. }
  110. printf("- Received a connection\n");
  111. ReceiveClientMessages(clientSocket, clientInfo);
  112. printf("- Shutting down connection\n");
  113. int iResult = shutdown(clientSocket, SD_SEND);
  114. if (iResult == SOCKET_ERROR) {
  115. closesocket(clientSocket);
  116. }
  117. }
  118. VOID StartVulnerableServer() {
  119. struct addrinfo* addrResult = InitWinsock();
  120. if (!addrResult) {
  121. printf("- Failed to init Winsock.\n");
  122. return;
  123. }
  124. serverSocket = CreateSocket(addrResult);
  125. int iResult = Listen();
  126. if (!iResult) {
  127. return;
  128. }
  129. while (TRUE) {
  130. AcceptConnection();
  131. }
  132. }
  133. int main(int argc, char** argv) {
  134. StartVulnerableServer();
  135. return 0;
  136. }