Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43428
  • Total Topics: 16525
  • Online today: 2780
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2779
Total: 2780









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Pez
« on: 26. June 2012., 09:26:58 »


Vulnerability in Microsoft XML Core Services Opens Door to Attackers

Microsoft has issued a security advisory that describes a vulnerability in its XML module. McAfee has also observed that the vulnerability is being actively exploited in the wild. The vulnerability exists when the function “msxml3!_dispatchImpl::InvokeHelper” in Microsoft’s XML attempts to access an object in memory that has not been initialized, allowing attacker to execute arbitrary code.

Metasploit has released an exploit module for this vulnerability. We have modified the Metasploit-generated HTML exploit to locate the vulnerability and observed the crash in the msxml module in Internet Explorer. The following code crashes IE.


Larger Picture

Windbg shows Internet Explorer crash

Investigating the crash reveals that the flaw exists in the function “msxml3!_dispatchImpl::InvokeHelper,” which attempts to access an uninitialized local variable as shown in the following image.


Larger Picture

The vulnerable function

This flaw allows an attacker to control the execution of the program and transfer the control to the malicious shellcode.


Larger Picture

Execution transferred to the shellcode

After gaining control, the malicious process decrypts the shellcode and downloads a malicious file from a remote server.


Larger Picture

Decrypting the URL

We have also observed that the attack is carried out by injecting the malicious URL through an iframe. We advise caution while opening unsolicited emails and unknown links. McAfee detects these exploits as “Exploit-CVE-2012-1889.” However, we strongly recommend installing the Microsoft patch to stay protected.

Thanks to my colleagues Varadharajan Krishnasamy and Sujit Ghosal for their valuable contributions.



Orginal article: Monday, June 25, 2012 at 3:11pm by Abhijit Mohanta

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023