应该是很难利用的,或者要结合一些环境。

不过08-052是很多漏洞的集合,不知道其中是否有可以利用的

不过小道消息的wild exploit一般是假的或者是有一定限制条件的或者是不稳定的。


[Ph4nt0m] 
[Ph4nt0m Security Team]
                  [EMAIL PROTECTED]
          Email:  [EMAIL PROTECTED]
          PingMe: 
          === Ultimate Hacking ===
          === XPLOITZ ! ===
          === #_# ===
#If you brave,there is nothing you cannot achieve.#
 

-----邮件原件-----
发件人: [email protected] [mailto:[EMAIL PROTECTED] 代表
Cmdhz
发送时间: 2008年9月17日 11:12
收件人: Ph4nt0m
主题: [Ph4nt0m] 关于ms08-052漏洞的请教!

最近看了下ms08-052的漏洞, 奇虎取了一个骇人听闻的标题 “奇虎360称发现微软史
上最大安全漏洞 ”。

但是有安全组织研究声称这个漏洞利用不了:

The integer overflow can be triggered via a WMF file containing a
specially crafted
PolyPolygon record that specifies an overly large number of points.
Attacker-controlled
data will be written past the end of an under-sized heap buffer,
ultimately triggering
an access violation that will be handled by an exception handler.

The data written beyond the end of the allocated buffer is influenced
by the attacker,
but only the lower 16-bits of each 32-bit word can be controlled and
the upper bits will
be either all zeroes or all ones. As the attacker cannot specify a
usable address, it
appears unlikely that code execution would be possible, however, it
cannot be completely
ruled out.

声称不能用,最用成功利用的例子其实也不少,不知道这个会不会又是一个耳光?

所以特地请各位讨论一些看能不能利用?


--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

回复