MS Windows Explorer and Internet Explorer CLSID文件执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1106304 漏洞类型 设计错误
发布时间 2001-04-17 更新时间 2006-11-13
CVE编号 CVE-2001-0643 CNNVD-ID CNNVD-200109-104
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20774
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200109-104
|漏洞详情
当ClassID(CLSID)在文件名末尾时,InternetExplorer5.5版本不能显示。攻击者通过使文件成为安全文件类型诱骗用户执行危险程序。
|漏洞EXP
source: http://www.securityfocus.com/bid/2612/info

The default operation performed to open a filetype is determining by referencing the filetype's CLSID. Due to a flaw in the interpretation of CLSIDs when appended to a filename, it is possible to specify a different default action for a given file than would normally be used. As a result, seemingly harmless files (.txt, .jpg etc) may be opened in a nonstandard, attacker specified manner. For example, a program ("evil.exe") could be renamed "evil.jpg.{CLSID_of_executables}" and when opened by the target user, this file will be executed instead of opened by their default .jpg viewer. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20774.zip
|参考资料

来源:XF
名称:ie-clsid-execute-files(6426)
链接:http://xforce.iss.net/static/6426.php
来源:BUGTRAQ
名称:20010416Doubleclickingoninnocentlookingfilesmaybedangerous
链接:http://www.securityfocus.com/archive/1/176909
来源:www.sarc.com
链接:http://www.sarc.com/avcenter/venc/data/vbs.postcard@mm.html
来源:vil.nai.com
链接:http://vil.nai.com/vil/virusSummary.asp?virus_k=99048
来源:BID
名称:2612
链接:http://www.securityfocus.com/bid/2612
来源:OSVDB
名称:7858
链接:http://www.osvdb.org/7858
来源:www.guninski.com
链接:http://www.guninski.com/clsidext.html