Motorola Timbuktu Pro 对端消息包文伪造漏洞 CVE-2008-1118 CNNVD-200803-229

7.5 AV AC AU C I A
发布: 2008-03-14
修订: 2018-10-11

Motorola的Timbuktu Pro是一款远程控制软件,允许远程访问计算机桌面。 Timbuktu直接从用户所发送的报文中获取了一些包含有对等端信息的字段(计算机名、用户名、IP地址等),并在目标机器的屏幕上显示这些信息,攻击者在受害用户的日志行中伪造对等端信息。 以下是反汇编的漏洞代码: /----------- .text:6063A62E mov edx, [ebp+lp] .text:6063A631 mov eax, [edx+20h] ; Packet field containing filename .text:6063A634 push eax ; EAX is also the output buffer .text:6063A635 call ds:Pascal2C ; Extract filename from packet .text:6063A63B push \'\'\\'\' ; Char to filter in the filename .text:6063A63D mov ecx, [ebp+lp] .text:6063A640 mov edx, [ecx+20h] .text:6063A643 push edx ; Filename obtained in 0x6063A635 .text:6063A644 call _strrchr ; Search for \'\'\\'\' in the filename .text:6063A649 add esp, 8 ; At this point, the pointer to the ; position of the \'\'\\'\' is obtained and ; will be stored in a local variable. .text:6063A64C mov [ebp+pSlashPosition], eax ; Store \'\'\\'\' pointer .text:6063A64F cmp [ebp+pSlashPosition], 0 ; This is the BUG !!!! .text:6063A653 jnz short loc_6063A669 ; It avoids checking \'\'/\'\' if ;...

0%
当前有1条漏洞利用/PoC
当前有1条受影响产品信息