本机测试环境为win xp sp3+IE6,msvidctl版本为6.5.2600.5512,漏洞样本来自metasploit\msf3\modules\exploits\windows\browser\msvidctl_mpeg2.rb,实际上这不是一个浏览器漏洞,而是DirectShow mpeg2组件漏洞,CVE编号CVE-2008-0015。其组件msvidctl在加载特制mpeg2文件时可能存在溢出,成功的利用将引发执行任意代码。
注释掉heapspray,将喷射内容换为无效指令,漏洞触发后,crash信息如下
(238.aa8): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=00000020 ecx=00000000 edx=00000000 esi=00000000 edi=03172224
eip=59f0d5a8 esp=00127c8c ebp=00127cbc iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010202
msvidctl!ATL::AtlIPersistStreamInit_Load+0x1ee:
59f0d5a8 397308 cmp dword ptr [ebx+8],esi ds:0023:00000028=????????
0:000> k
ChildEBP RetAddr
00127cbc 59f0d46e msvidctl!ATL::AtlIPersistStreamInit_Load+0x1ee
00127d08 59f0d46e msvidctl!ATL::AtlIPersistStreamInit_Load+0xb4
00127d54 59f0d38a msvidctl!ATL::AtlIPersistStreamInit_Load+0xb4