首页
社区
课程
招聘
OllyDbg Format String Vulnerability
发表于: 2005-5-16 14:17 3614

OllyDbg Format String Vulnerability

2005-5-16 14:17
3614
Vulnerable Systems:
* OllyDbg version 1.10

Vulnerability takes place when module (with special crafted file name) executes int 3 instruction (trap to debugger).

Disassembler Snippets:
Here is the vulnerable code:

.text:0042FBE0 lea eax, [ebp+buffer]
.text:0042FBE6 push eax ; format string
.text:0042FBE7 mov edx, [ebp+var_28]
.text:0042FBEA push edx
.text:0042FBEB call sub_42E100 ; _vsprintf->
;___vprinter

When format is an ASCII string like: "INT3 command at <module_name>.addr", Attacker can place a format string chars inside "<module_name>" (part of format buffer) and cause Olly to overwrite arbitrary data.

NOTE: Even with "IGNORE INT3 BREAKS" option checked, OllyDbg is still vulnerable. Attacker can also load some special crafted module (with special crafted name) while debugging, to make the attack more stealthy.

[注意]看雪招聘,专注安全领域的专业人才平台!

收藏
免费
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回

账号登录
验证码登录

忘记密码?
没有账号?立即免费注册