📄 768.html
字号:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>[AD_LAB-04004] Microsoft Windows LoadImage API 整数溢出触发缓冲区溢出 </title>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<meta name="Keywords" content="安全焦点, xfocus, 陷阱网络, honeynet, honeypot, 调查取证, forensic, 入侵检测, intrusion detection, 无线安全, wireless security, 安全论坛, security forums, 安全工具, security tools, 攻击程序, exploits, 安全公告, security advisories, 安全漏洞, security vulnerabilities, 安全教程, security tutorials, 安全培训, security training, 安全帮助, security help, 安全标准, security standards, 安全代码, security code, 安全资源, security resources, 安全编程, security programming, 加密, cryptography," />
<link rel="stylesheet" href="../../css/plone.css" type="text/css">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="top">
<div class="searchBox">
<form name="searchform" action="http://www.google.com/search" method="get">
<input type="hidden" name="domains" value="www.xfocus.net">
<input type="hidden" name="sitesearch" value="www.xfocus.net">
<input type="text" name="q" size="20">
<input type="submit" name="btnG" value="Google Search">
</form>
</div>
<img src="../../images/logo.gif" border="0" width="180" height="80" alt="xfocus logo">
<img src="../../images/title.gif" border="0" width="230" height="20" alt="xfocus title">
</div>
<div class="tabs">
<a href="../../index.html" class="plain">首页</a>
<a href="../../releases/index.html" class="plain">焦点原创</a>
<a href="../../articles/index.html" class="selected">安全文摘</a>
<a href="../../tools/index.html" class="plain">安全工具</a>
<a href="../../vuls/index.html" class="plain">安全漏洞</a>
<a href="../../projects/index.html" class="plain">焦点项目</a>
<a href="https://www.xfocus.net/bbs/index.php?lang=cn" class="plain">焦点论坛</a>
<a href="../../about/index.html" class="plain">关于我们</a>
</div>
<div class="personalBar">
<a href='https://www.xfocus.net/php/add_article.php'>添加文章</a> <a href='http://www.xfocus.org/'>English Version</a>
</div>
<table class="columns">
<tr>
<td class="left">
<div class="box">
<h5> 文章分类 </h5>
<div class="body">
<div class="content odd">
<div style="white-space: nowrap;">
<img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/4.html'>专题文章</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/2.html'>漏洞分析</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/3.html'>安全配置</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/1.html'>黑客教学</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/5.html'>编程技术</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/7.html'>工具介绍</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/6.html'>火墙技术</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/8.html'>入侵检测</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/9.html'>破解专题</a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/11.html'><b>焦点公告 <<</b></a><br><img src='../../images/folder_icon.gif' border='0'> <a href='../../articles/12.html'>焦点峰会</a><br>
</div>
</div>
</div>
</div>
<div class="box">
<h5> 文章推荐 </h5>
<div class="body">
<div class="content odd">
<img src='../../images/document_icon.gif' border='0'> <a href='../../articles/200408/733.html'>补丁管理最佳安全实践之资产评估</a><br><img src='../../images/document_icon.gif' border='0'> <a href='../../articles/200404/689.html'>国内网络安全风险评估市场与技术操作</a><br><img src='../../images/document_icon.gif' border='0'> <a href='../../articles/200410/743.html'>协作的信息系统风险评估</a><br>
</div>
</div>
</div>
</td>
<td class="main">
<h1>[AD_LAB-04004] Microsoft Windows LoadImage API 整数溢出触发缓冲区溢出</h1><br>创建时间:2004-12-23 更新时间:2004-12-23<br>文章属性:原创<br>文章提交:<a href='https://www.xfocus.net/bbs/index.php?lang=cn&act=Profile&do=03&MID=20515'>flashsky</a> (flashsky1_at_sina.com)<br><br>[安全通告]<br />
通告:[AD_LAB-04004] Microsoft Windows LoadImage API 整数溢出触发缓冲区溢出<br />
分类:范围检查错误<br />
日期:12/20/2004<br />
远程:允许远程攻击者通过WEB页面攻击<br />
CVE编号:<br />
受威胁的系统:<br />
Windows NT <br />
Windows 2000 SP0<br />
Windows 2000 SP1<br />
Windows 2000 SP2<br />
Windows 2000 SP3<br />
Windows 2000 SP4<br />
Windows XP SP0<br />
Windows XP SP1<br />
Windows 2003<br />
未受威胁的系统:<br />
windows xp sp2<br />
厂商:<br />
<a href='http://www.microsoft.com' target='_blank'>www.microsoft.com</a><br />
<br />
1.漏洞描述:<br />
WINDOWS的USER32库的LoadImage系统API 存在着整数溢出触发的缓冲区溢出漏洞,这个API允许加载一个bmp,cur,ico,ani格式的图标<br />
来进行显示,并根据图片格式里说明的大小加4来进行数据的拷贝,如果将图片格式里说明的大小设置为0xfffffffc-0xffffffff,则将触发<br />
整数溢出导致堆缓冲区被覆盖。攻击者可以构造恶意的bmp,cur,ico,ani格式的文件,嵌入到HTML页面,邮件中,发送给被攻击者,成功利<br />
用该漏洞则可以获得系统的权限。<br />
<br />
2.技术细节:<br />
LoadImage函数的定义如下<br />
HANDLE LoadImage( <br />
HINSTANCE hinst,<br />
LPCTSTR lpszName,<br />
UINT uType,<br />
int cxDesired,<br />
int cyDesired,<br />
UINT fuLoad);<br />
lpszName参数是用户指定的图标文件,uType参数可以指定为IMAGE_BITMAP加载一个BMP文件,IMAGE_CURSOR加载一个cur或ani文件,<br />
IMAGE_ICON加载一个ico文件。<br />
在LoadImage内部对这bmp,cur,ico,ani格式的长度的解析并没有做有效的检查,产生错误的代码如下:<br />
由ANI或CUR触发的时候:<br />
.text:77D56178 mov eax, [ebx+8] <------------读取我们设置的值<br />
.text:77D5617B mov [ebp+dwResSize], eax <br />
.text:77D5617E jnz short loc_77D56184<br />
.text:77D56180 add [ebp+dwResSize], 4 <------------加4,整数溢出<br />
.text:77D56184<br />
.text:77D56184 loc_77D56184: ; CODE XREF: sub_77D5608F+EFj<br />
.text:77D56184 push [ebp+dwResSize] <-----------分配错误的堆内存<br />
.text:77D56187 push 0<br />
.text:77D56189 push dword_77D5F1A0<br />
.text:77D5618F call ds:RtlAllocateHeap<br />
<br />
其后的数据拷贝则是按我们给定的值进行拷贝,导致了堆的溢出。<br />
.text:77D561A9 mov ecx, [ebx+8]<br />
.text:77D561AC mov esi, [ebx+0Ch]<br />
.text:77D561AF add esi, [ebp+arg_0]<br />
.text:77D561B2 mov edx, ecx<br />
.text:77D561B4 shr ecx, 2<br />
.text:77D561B7 mov edi, eax<br />
.text:77D561B9 rep movsd<br />
.text:77D561BB mov ecx, edx<br />
.text:77D561BD and ecx, 3<br />
.text:77D561C0 rep movsb<br />
<br />
相应的,在处理ico,bmp图片的时候,一样存在着该漏洞,对应的错误代码不再一一显示出。<br />
可以通过访问 <a href='http://www.xfocus.net/flashsky/icoExp/index.html' target='_blank'>http://www.xfocus.net/flashsky/icoExp/index.html</a> 来验证此漏洞<br />
<br />
3.感谢: <br />
Flashsky (fangxing@venustech.com.cn;flashsky@xfocus.org)发现并公布了此漏洞的具体技术细节 <br />
感谢启明星辰技术信息有限公司积极防御实验室的伙伴和丰收项目小组。<br />
<br />
4.申明:<br />
<br />
The information in this bulletin is provided "AS IS" without warranty of any<br />
kind. In no event shall we be liable for any damages whatsoever including direct,<br />
indirect, incidental, consequential, loss of business profits or special damages. <br />
<br />
Copyright 1996-2004 VENUSTECH. All Rights Reserved. Terms of use.<br />
<br />
VENUSTECH Security Lab <br />
VENUSTECH INFORMATION TECHNOLOGY CO.,LTD(<a href='http://www.venustech.com.cn' target='_blank'>http://www.venustech.com.cn</a>)<br />
<br />
Security<br />
Trusted {Solution} Provider<br />
Service
</td>
</tr>
</table>
<div class="footer">
Copyright © 1998-2003 XFOCUS Team. All Rights Reserved
</div>
</body>
</html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -