发布时间 :2005-08-23 00:00:00
修订时间 :2008-09-05 16:52:24

[原文]Buffer overflow in Sysinternals Process Explorer 9.23, and other versions before 9.25, allows local users to execute arbitrary code via a long CompanyName field in the VersionInfo information in a running process.

[CNNVD]Process Explorer 缓冲区溢出漏洞(CNNVD-200508-261)

        Process Explorer是一款增强型的任务管理器,可以方便地管理程序进程,能强行关闭程序。
        Process Explorer中存在缓冲区溢出漏洞,攻击者可以利用这个漏洞溢出明确大小的缓冲区,导致执行任意代码。起因是没有正确的过滤用户输入。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  14616

- 漏洞信息

Process Explorer 缓冲区溢出漏洞
危急 缓冲区溢出
2005-08-23 00:00:00 2005-10-20 00:00:00
        Process Explorer是一款增强型的任务管理器,可以方便地管理程序进程,能强行关闭程序。
        Process Explorer中存在缓冲区溢出漏洞,攻击者可以利用这个漏洞溢出明确大小的缓冲区,导致执行任意代码。起因是没有正确的过滤用户输入。

- 公告与补丁

        Sysinternals Upgrade For Win9x/Me.
        Sysinternals Upgrade For NT/2K/XP/Server 2003<
        Sysinternals Upgrade For 64-bit XP/Server 2003

- 漏洞信息

Sysinternals Process Explorer CompanyName Field Processing Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-19 2005-07-20
Unknow Unknow

- 解决方案

Upgrade to version 9.25 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Sysinternals Process Explorer CompanyName Value Buffer Overflow Vulnerability
Boundary Condition Error 14616
Yes Yes
2005-08-20 12:00:00 2009-07-12 05:06:00
ATmaCA <> is credited with the discovery of this vulnerability.

- 受影响的程序版本

Sysinternals Process Explorer 9.23
Sysinternals Process Explorer 9.25

- 不受影响的程序版本

Sysinternals Process Explorer 9.25

- 漏洞讨论

Process Explorer is prone to a buffer overflow vulnerability. This issue is due to a failure in the application to perform proper bounds checking on user-supplied data.

A successful attack can result in the overflowing of a finite sized buffer and may ultimately lead to the execution of arbitrary code in the context of the affected application.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

A proof of concept exploit is available at the following location:

- 解决方案

The vendor has addressed this issue in Process Explorer 9.25.

Sysinternals Process Explorer 9.23

- 相关参考