[News]Microsoft Windows Cursor and Icon Format Remote Code Execution (0day)
就是最新那个ie 0day了,实际上利用方法不止是ie,用winhex等打开都会中,问题似乎是出在
user32.dll 的 loadcursorxxxxxxx ,函数返回时crash。
用资源管理器打开那个目录也可以触发,和以前的ms06-001 wmf漏洞有些相象,危害非常大。
Frsirt描述如下:
A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to take complete control of an affected system. This issue is due to a memory corruption error when rendering malformed cursors, animated cursors or icons, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a malicious web page or viewing an email message containing a specially crafted ANI file.
Note : This zero-day vulnerability is currently being exploited in the wild.
Frsirt还把这个当钱卖,但是已经在网上有人公开生成器了。
http://www.hackeroo.com/read.php?tid-3014.html
另外,这个漏洞是影响VISTA的!
Affected Products
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP 64-Bit Edition ersion 2003 (Itanium)
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 (Itanium)
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 SP1 (Itanium)
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Vista
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
没有评论:
发表评论