作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (17): 180-182. doi: 10.3969/j.issn.1000-3428.2008.17.064

• 安全技术 • 上一篇    下一篇

MS07-017动画光标处理漏洞的分析与利用

李 频1,江洁欣2   

  1. (1. 南京邮电大学计算机学院,南京 210003;2. 东南大学计算机科学与工程学院,南京 210018)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-09-05 发布日期:2008-09-05

Analysis and Exploitation of MS07-017 Animated Cursor Handling Vulnerability

LI Pin1, JIANG Jie-xin2   

  1. (1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003; 2. College of Computer Science and Engineering, Southeast University, Nanjing 210018)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-09-05 Published:2008-09-05

摘要: 缓冲区溢出攻击目前已成为引发计算机安全问题的主要原因,微软公司发布的MS07-017动画光标处理漏洞就是一个“严重”等级的栈溢出漏洞。该文研究Win32操作系统中缓冲区溢出的原理与利用方法,以MS07-017安全公告中动画光标处理漏洞为实例,分析该漏洞产生的原理并讨论编写shellcode的一般方法,编写了一个恶意.ani动画光标文件生成器。

关键词: 缓冲区溢出, MS07-017安全公告, 动画光标处理漏洞

Abstract: Buffer overflow attack now becomes the main reason for the happening of security events. The MS07-017 animated cursor handling vulnerability presented by Microsoft is a stack overflow vulnerability rated as critical. This paper is mainly focused on the buffer overflow principle and exploitation on Win32 platform, and takes the MS07-017 animate cursor handling vulnerability as example to demonstrate the concepts. An in-depth analysis of this vulnerability is also presented in the paper to reveal how it occurs and a discussion of how to write the shellcode is available. A mal-formed animated cursor file generator is coded to prove the analysis.

Key words: buffer overflow, MS07-017 security announcement, animated cursor handling vulnerability

中图分类号: