其他
全球很多大厂都在用的Nitro PDF Pro 被曝7个 RCE 0day 漏洞(来看详情)
将推出微补丁修复7个漏洞
Mitja Kolsek 表示,“我们将其作为推出微补丁的演练,但并不想公开补丁,因为这个 0day 并未公开,因此我们实际上通过补丁的方式将其公开了。”
CVE-2019-5050 详情
2 0 obj
<<
/Count 1
/Kids [ 3 0 R ]
>>
endobj
3 0 obj
<<
/Type /Page
/Count 20
/Kids [ 4 0 R ]
>>
endobj
(3d18.6774): Access violation - code c0000005 (!!! second chance !!!)
npdf!PDDocUpdateTextCache+0x5400:
00007ff9`1dee6890 410f1001 movups xmm0,xmmword ptr [r9] ds:000001be`3fc211c0=????????????????????????????????
0:000> k 5
# Child-SP RetAddr Call Site
00 00000030`f49fe090 00007ff9`1ded52b4 npdf!PDDocUpdateTextCache+0x5400
01 00000030`f49fe0d0 00007ff9`1dedbfba npdf!PDWordFinderReleaseWordList+0x10d44
02 00000030`f49fe210 00007ff9`1deeadee npdf!PDDocAcquirePage+0x3a
03 00000030`f49fe260 00007ff9`1dee6de3 npdf!PDDocUpdateTextCache+0x995e
04 00000030`f49fe2a0 00007ff9`1dee0811 npdf!PDDocUpdateTextCache+0x5953
.text:00000001803C6890 movups xmm0, xmmword ptr [r9]
.text:00000001803C6894 add r9, 18h
.text:00000001803C6898 add rax, 18h
.text:00000001803C689C movups xmmword ptr [rax-18h], xmm0
.text:00000001803C68A0 movsd xmm1, qword ptr [r9-8]
.text:00000001803C68A6 movsd qword ptr [rax-8], xmm1
.text:00000001803C68AB cmp r9, rcx
.text:00000001803C68AE jnz short loc_1803C6890
npdf!PDWordFinderReleaseWordList+0x10d3f:
00007ff9`1ded52af e87c150100 call npdf!PDDocUpdateTextCache+0x53a0 (00007ff9`1dee6830)
0:000> ?r8
Evaluate expression: 1863222632440 = 000001b1`d0b91ff8
0:000> ?r9
Evaluate expression: 1863222632896 = 000001b1`d0b921c0
0:000> dd r9
000001b1`d0b921c0 ???????? ???????? ???????? ????????
000001b1`d0b921d0 ???????? ???????? ???????? ????????
000001b1`d0b921e0 ???????? ???????? ???????? ????????
000001b1`d0b921f0 ???????? ???????? ???????? ????????
000001b1`d0b92200 ???????? ???????? ???????? ????????
000001b1`d0b92210 ???????? ???????? ???????? ????????
000001b1`d0b92220 ???????? ???????? ???????? ????????
000001b1`d0b92230 ???????? ???????? ???????? ????????
00007ff9`1ded5286 488b4628 mov rax,qword ptr [rsi+28h]
00007ff9`1ded528a 8bcb mov ecx,ebx
00007ff9`1ded528c 48ffc1 inc rcx
00007ff9`1ded528f 488d1449 lea rdx,[rcx+rcx*2] [1]
00007ff9`1ded5293 4c8d0cd0 lea r9,[rax+rdx*8] [2]
00007ff9`1ded5297 8b5c2440 mov ebx,dword ptr [rsp+40h]
00007ff9`1ded529b 488d0c5b lea rcx,[rbx+rbx*2] [3]
00007ff9`1ded529f 4c8d04c8 lea r8,[rax+rcx*8] [4]
00007ff9`1ded52a3 488d942488000000 lea rdx,[rsp+88h]
00007ff9`1ded52ab 488d4e28 lea rcx,[rsi+28h]
00007ff9`1ded52af e87c150100 call npdf!PDDocUpdateTextCache+0x53a0 (00007ff9`1dee6830)
如上 [1]中,数组的索引被计算为 rdx。rcx 中的值直接来自对象中的 /Count 值。然后在[2]中,计算了内存数组的偏移量,而 r9 指向其最终值。同样,在 [3] 和 [4] 中,计算了目标指针,只有 ebx 中的值实际上表示了目前为止找到的有效的 /Page 对象的数量。
安全报告被垃圾邮件淹没?
https://www.bleepingcomputer.com/news/security/nitro-pdf-pro-to-get-micropatches-for-7-potential-rce-bugs/
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819
奇安信代码卫士 (codesafe)
国内首个专注于软件开发安全的产品线。