操作系统:Vmware Windows xp sp3Office 版本:Microsoft Office Word 2003 漏洞文件:MSO.DLL 11.0.5606.0 调试器:Windbg:6.12.0002.633 x86
2. 复现过程1、利用metasploit生成可触发漏洞的poc样本 2、获取样本后,在windows xp下运行windbg ,并附加运行winword.exe
3、在windbg下按g继续运行word,并用word打开样本文件msf.rtf,发现word报错,并且未响应。
(7f8.684): Access violation - code c0000005 (first chance)First chance exceptions are reported before any exception handling.This exception may be expected and handled.eax=0000c8ac ebx=05000000 ecx=0000019b edx=00000000 esi=1104c24c edi=00130000eip=30e9eb88 esp=00123d98 ebp=00123dd0 iopl=0 nv up ei pl nz na pe nccs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Microsoft Shared\office11\mso.dll - mso!Ordinal6426+0x64d:30e9eb88 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
错误代码 c0000005 (first chance)出现了栈溢出
错误文件是mso.dll MSO.DLL 被视为一种 Microsoft Office 2010 component 文件。 它最常用于由 Microsoft 开发的 Microsoft Office 2010。 它使用 DLL 文件扩展名, 并被视为 Win64 DLL (动态链接库) 文件。