Panda ActiveScan远程溢出和任意CAB文件安装漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1115617 漏洞类型 缓冲区溢出
发布时间 2008-07-04 更新时间 2008-09-05
CVE编号 CVE-2008-3155 CNNVD-ID CNNVD-200807-207
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/6004
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200807-207
|漏洞详情
PandaActiveScan是熊猫的免费在线病毒扫描工具。ActiveScan2.0AVClassActiveX控件(as2guiie.dll)没有正确地验证对Update()方式所提供的输入,如果用户受骗访问了恶意网页并向该方式传送了恶意参数的话,就会触发栈溢出或在用户系统上安装任意cabinet文件。
|漏洞EXP
Author:  	Karol Wiesek <karol [at] wiesek {dizd0t} pl>
Homepage:	http://karol.wiesek.pl/

There exists two vulnerabilities in Panda Security ActiveScan 2.0 Update function.
1) typical overflow ( this exploit )
2) Update function allows to install any ( attacker suplied ) CABinet into victims system

Panda Security have not respond in any manner, thus i have no information of any patches, plans for patching ...

* UPDATE * 

Panda has patched newest version, so update will not connect to custom ( attacker supplied ) URL.

Exploit:
http://karol.wiesek.pl/files/panda.tgz
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6004.tgz (2008-panda.tgz)

# milw0rm.com [2008-07-04]
|参考资料

来源:XF
名称:panda-activescan-bo(43588)
链接:http://xforce.iss.net/xforce/xfdb/43588
来源:SECTRACK
名称:1020432
链接:http://www.securitytracker.com/id?1020432
来源:BID
名称:30086
链接:http://www.securityfocus.com/bid/30086
来源:MILW0RM
名称:6004
链接:http://www.milw0rm.com/exploits/6004
来源:VUPEN
名称:ADV-2008-2008
链接:http://www.frsirt.com/english/advisories/2008/2008/references
来源:SECUNIA
名称:30841
链接:http://secunia.com/advisories/30841
来源:FULLDISC
名称:20080704PandaActiveScan2.0remotecodeexecution
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063068.html
来源:FULLDISC
名称:20080705PandaActiveScan2.0remotecodeexecution
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063061.html
来源:MISC
链接:http://karol.wiesek.pl/files/panda.tgz