Microsoft Visual Studio UserControl远程代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109623 漏洞类型 设计错误
发布时间 2006-01-12 更新时间 2007-06-27
CVE编号 CVE-2006-0187 CNNVD-ID CNNVD-200601-127
漏洞平台 Windows CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/27073
https://www.securityfocus.com/bid/16225
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-127
|漏洞详情
MicrosoftVisualStudio是美国微软(Microsoft)公司的一款开发工具套件系列产品,也是一个基本完整的开发工具集。它包括了整个软件生命周期中所需要的大部分工具。VisualStudio没有事先通知用户便允许执行一个项目文件中的代码。在将UserControl添加到WindowsFormular中时,如果显示了UserControl所在的主窗体的话,VS就可能自动启动UserControl_Load函数中的代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/16225/info
 
Microsoft Visual Studio is prone to a vulnerability that could allow remote attackers to execute arbitrary code. This issue stems from a design flaw that executes code contained in a project file without first notifying users.
 
Exploiting this issue allows attackers to execute arbitrary code in the context of the user viewing a malicious project file. Since viewing a project file is usually considered a safe operation, users may have a false sense of security by attempting to inspect unknown code before compiling or executing it.
 
This vulnerability may be remotely exploited due to project files originating from untrusted sources.
 
Visual Studio 2005 is reportedly vulnerable to this issue; other versions may also be affected.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27073.zip
|受影响的产品
Nortel Networks CallPilot 4.0 Nortel Networks CallPilot 3.0 Microsoft Visual Studio 2005 Microsoft Visual Studio .NET Trial Edition 0 - Microsoft Windows 2000 Adv
|参考资料

来源:BID
名称:16225
链接:http://www.securityfocus.com/bid/16225
来源:BUGTRAQ
名称:20060113VisualStudioRemoteCodeExecution
链接:http://www.securityfocus.com/archive/1/archive/1/421943/100/0/threaded
来源:VUPEN
名称:ADV-2006-0151
链接:http://www.frsirt.com/english/advisories/2006/0151
来源:SECUNIA
名称:18409
链接:http://secunia.com/advisories/18409
来源:XF
名称:visualstudio-usercontrol-code-execution(24116)
链接:http://xforce.iss.net/xforce/xfdb/24116