Microsoft Internet Explorer嵌套OBJECT标签内存破坏漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110121 漏洞类型 资源管理错误
发布时间 2006-04-22 更新时间 2006-06-19
CVE编号 CVE-2006-1992 CNNVD-ID CNNVD-200604-438
漏洞平台 Windows CVSS评分 2.6
|漏洞来源
https://www.exploit-db.com/exploits/27727
https://cxsecurity.com/issue/WLB-2006040102
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-438
|漏洞详情
MicrosoftIntrnetExplorer是微软发布的非常流行的WEB浏览器。MicrosoftInternetExplorer处理某些嵌套OBJECT标签组合的方式存在漏洞,远程攻击者可能利用此漏洞导致浏览器拒绝服务。通过以下方式生成的HTML:perl-e'{print"\n\nBork\n"x32}'>test.html会在mshtml.dll中导致空指针引用和固定的偏移(eax+0x28),从已分配的但清零的内存区域读取指针。上述情况仍不可利用,但如果向页面中插入OBJECT和其他标签、增加嵌套OBJECT的数量并向OBJECT的最终序列添加各种长度的伪造"type="参数就会导致崩溃,也可能会导致代码执行。漏洞公告目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.microsoft.com/windows/ie/default.asp参考网址来源:MS名称:MS06-021链接:http://www.microsoft.com/technet/security/bulletin/ms06-021.mspx来源:VUPEN名称:ADV-2006-1507链接:http://www.frsirt.com/english/advisories/2006/1507来源:SECTRACK名称:1016291链接:http://securitytracker.com/id?1016291来源:SECUNIA名称:19762链接:http://secunia.com/advisories/19762来源:BID名称:17658链接:http://www.securityfocus.com/bid/17658来源:BUGTRAQ名称:20060422MSIE(mshtml.dll)OBJECTtagvulnerability链接:http://www.securityfocus.com/archive/1/archive/1/431796/100/0/threaded来源:SECTRACK名称:1016001链接:http://securitytracker.com/id?1016001来源:FULLDISC名称:20060422Re:MSIE(mshtml.dll)OBJECTtagvulnerab
|漏洞EXP
source: http://www.securityfocus.com/bid/17658/info

Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This issue is due to a flaw in the application in handling nested OBJECT tags in HTML content.

An attacker could exploit this issue via a malicious web page to potentially execute arbitrary code in the context of the currently logged-in user, but this has not been confirmed. Exploit attempts likely result in crashing the affected application. Attackers could exploit this issue through HTML email/newsgroup postings or through other applications that employ the affected component.

Microsoft Internet Explorer 6 for Microsoft Windows XP SP2 is reportedly vulnerable to this issue; other versions may also be affected.

perl -e '{print "<STYLE></STYLE>\n<OBJECT>\nBork\n"x32}' >test.html
|参考资料

来源:MS
名称:MS06-021
链接:http://www.microsoft.com/technet/security/bulletin/ms06-021.mspx
来源:VUPEN
名称:ADV-2006-1507
链接:http://www.frsirt.com/english/advisories/2006/1507
来源:SECTRACK
名称:1016291
链接:http://securitytracker.com/id?1016291
来源:SECUNIA
名称:19762
链接:http://secunia.com/advisories/19762
来源:BID
名称:17658
链接:http://www.securityfocus.com/bid/17658
来源:BUGTRAQ
名称:20060422MSIE(mshtml.dll)OBJECTtagvulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/431796/100/0/threaded
来源:SECTRACK
名称:1016001
链接:http://securitytracker.com/id?1016001
来源:FULLDISC
名称:20060422Re:MSIE(mshtml.dll)OBJECTtagvulnerability
链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0616.html
来源:XF
名称:ie-object-memory-corruption(25978)
链接:http://xforce.iss.net/xforce/xfdb/25978
来源:OSVDB
名称:27475
链接:http://www.osvdb.org/27475
来源:SREASON
名称:781
链接:http://securityreason.com/securityalert/781
来源:FULLDISC
名称:20060423MSIE(mshtml.dll)OBJECTtagvulnerability
链接:http://lists.grok.org.uk/pipermail/full-disclosu