1 Microsoft Internet Explorer对象释放后使用漏洞(CNNVD-201101-076)Microsoft Internet Explorer是一款Microsoft公司开发和维护的流行的Web浏览器。Microsoft Internet Explorer8.0.7600.16385版本中的MSHTML.DLL中的ReleaseInterf...1 Microsoft Internet Explorer对象释放后使用漏洞(CNNVD-201101-076)Microsoft Internet Explorer是一款Microsoft公司开发和维护的流行的Web浏览器。Microsoft Internet Explorer8.0.7600.16385版本中的MSHTML.DLL中的ReleaseInterface函数存在释放后使用漏洞。展开更多
1Microsoft Active Directory缓冲区溢出漏洞(CNNVD-201102-239)Microsoft Active Directory是基于计算机和服务器MS Windows上的目录结构,用于存储网络和域的相关信息和数据。由于Microsoft Active Directory对用户提供的数据缺少边界...1Microsoft Active Directory缓冲区溢出漏洞(CNNVD-201102-239)Microsoft Active Directory是基于计算机和服务器MS Windows上的目录结构,用于存储网络和域的相关信息和数据。由于Microsoft Active Directory对用户提供的数据缺少边界检查,因此其Mrxsmb.sys中存在基于堆的缓冲区溢出漏洞,攻击者可以借助特制BROWSER ELECTION请求利用此漏洞以系统级别的权限执行任意代码,完全控制受影响计算机。展开更多
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int...Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.展开更多
文摘1 Microsoft Internet Explorer对象释放后使用漏洞(CNNVD-201101-076)Microsoft Internet Explorer是一款Microsoft公司开发和维护的流行的Web浏览器。Microsoft Internet Explorer8.0.7600.16385版本中的MSHTML.DLL中的ReleaseInterface函数存在释放后使用漏洞。
文摘1Microsoft Active Directory缓冲区溢出漏洞(CNNVD-201102-239)Microsoft Active Directory是基于计算机和服务器MS Windows上的目录结构,用于存储网络和域的相关信息和数据。由于Microsoft Active Directory对用户提供的数据缺少边界检查,因此其Mrxsmb.sys中存在基于堆的缓冲区溢出漏洞,攻击者可以借助特制BROWSER ELECTION请求利用此漏洞以系统级别的权限执行任意代码,完全控制受影响计算机。
基金Supported by the National Natural Science Foundation of China (60903188), Shanghai Education Commission Innovation Foundation (11YZ192) and World Expo Science and Technology Special Fund of Shanghai Science and Technology Commission (08dz0580202).
文摘Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.