Microsoft Internet Explorer CreateTextRange远程代码执行漏洞

漏洞信息详情

Microsoft Internet Explorer CreateTextRange远程代码执行漏洞

漏洞简介

Microsoft Internet Explorer是微软发布的非常流行的WEB浏览器。

Internet Explorer的createTextRange()函数实现上存在漏洞,远程攻击者可能利用此漏洞在客户机器上执行任意指令。

Internet Explorer使用createTextRange()时在某些环境下可能导致无需的列表指针引用,这样在试图调用引用的32位地址时就会出现错误,如下所示:

0x7D53C15D MOV ECX, DWORD PTR DS:[EDI]

..

0x7D53C166 CALL DWORD PTR [ECX]

由于这种引用,ECX会指向很远的不存在的内存位置,导致IE崩溃,也可能执行任意指令。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://www.microsoft.com/technet/security/Bulletin/MS06-013.mspx?pf=true

参考网址

来源: US-CERT

名称: TA06-101A

链接:http://www.us-cert.gov/cas/techalerts/TA06-101A.html

来源: US-CERT

名称: VU#876678

链接:http://www.kb.cert.org/vuls/id/876678

来源: XF

名称: ie-createtextrange-command-execution(25379)

链接:http://xforce.iss.net/xforce/xfdb/25379

来源: BID

名称: 17196

链接:http://www.securityfocus.com/bid/17196

来源: BUGTRAQ

名称: 20060328 Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote “CreateTextRange()” Code Execution)

链接:http://www.securityfocus.com/archive/1/archive/1/429124/30/6120/threaded

来源: BUGTRAQ

名称: 20060328 EEYE: Temporary workaround for IE createTextRange vulnerability

链接:http://www.securityfocus.com/archive/1/archive/1/429088/100/0/threaded

来源: BUGTRAQ

名称: 20060323 Secunia Research: Microsoft Internet Explorer “createTextRange()”Code Execution

链接:http://www.securityfocus.com/archive/1/archive/1/428600/100/0/threaded

来源: BUGTRAQ

名称: 20060322 Microsoft Internet Explorer (mshtml.dll) – Remote Code Execution

链接:http://www.securityfocus.com/archive/1/archive/1/428583/100/0/threaded

来源: BUGTRAQ

名称: 20060322 IE crash

链接:http://www.securityfocus.com/archive/1/428441

来源: OSVDB

名称: 24050

链接:http://www.osvdb.org/24050

来源: MS

名称: MS06-013

链接:http://www.microsoft.com/technet/security/bulletin/ms06-013.mspx

来源: www.microsoft.com

链接:http://www.microsoft.com/technet/security/advisory/917077.mspx

来源: VUPEN

名称: ADV-2006-1318

链接:http://www.frsirt.com/english/advisories/2006/1318

来源: VUPEN

名称: ADV-2006-1050

链接:http://www.frsirt.com/english/advisories/2006/1050

来源: MISC

链接:http://www.computerterrorism.com/research/ct22-03-2006

来源: CIAC

名称: Q-154

链接:http://www.ciac.org/ciac/bulletins/q-154.shtml

来源: SECTRACK

名称: 1015812

链接:http://securitytracker.com/id?1015812

来源: MISC

链接:http://secunia.com/secunia_research/2006-7/advisory/

来源: SECUNIA

名称: 18680

链接:http://secunia.com/advisories/18680

来源: FULLDISC

名称: 20060327 Determina Fix for the IE createTextRange() bug

链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1662.html

来源: FULLDISC

名称: 20060322 FW: [Full-disclosure] IE crash

链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1434.html

来源: FULLDISC

名称: 20060322 Microsoft Internet Explorer (mshtml.dll) – Remote Code Execution

链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1430.html

来源: FULLDISC

名称: 20060322 IE crash

链接:http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1427.html

来源: US Government Resource: oval:org.mitre.oval:def:985

名称: oval:org.mitre.oval:def:985

链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:985

来源: US Government Resource: oval:org.mitre.oval:def:1702

名称: oval:org.mitre.oval:def:1702

链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1702

来源: US Government Resource: oval:org.mitre.oval:def:1678

名称: oval:org.mitre.oval:def:1678

链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1678

来源: US Government Resource: oval:org.mitre.oval:def:1657

名称: oval:org.mitre.oval:def:1657

链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1657

来源: US Government Resource: oval:org.mitre.oval:def:1178

名称: oval:org.mitre.oval:def:1178

链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1178

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享