Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-6086 PoC — Microsoft Internet Explorer 信息泄漏漏洞

Source
Associated Vulnerability
Title:Microsoft Internet Explorer 信息泄漏漏洞 (CVE-2015-6086)
Description:Microsoft Internet Explorer(IE)是美国微软(Microsoft)公司开发的一款Web浏览器,是Windows操作系统附带的默认浏览器。 Microsoft IE 9版本至11版本中存在信息泄漏漏洞,该漏洞源于程序不正确地披露内存内容。攻击者可利用该漏洞获取信息,进一步破坏用户的系统。
Description
PoC for CVE-2015-6086
Readme
From Crash to Exploit: CVE-2015-6086 - Out of Bound Read/ASLR Bypass
===================================================================

     $$$$$$\  $$\    $$\ $$$$$$$$\       $$$$$$\   $$$$$$\    $$\  $$$$$$$\          $$$$$$\   $$$$$$\   $$$$$$\
    $$  __$$\ $$ |   $$ |$$  _____|     $$  __$$\ $$$ __$$\ $$$$ | $$  ____|        $$  __$$\ $$$ __$$\ $$  __$$\
    $$ /  \__|$$ |   $$ |$$ |           \__/  $$ |$$$$\ $$ |\_$$ | $$ |             $$ /  \__|$$$$\ $$ |$$ /  $$ |
    $$ |      \$$\  $$  |$$$$$\ $$$$$$\  $$$$$$  |$$\$$\$$ |  $$ | $$$$$$$\ $$$$$$\ $$$$$$$\  $$\$$\$$ | $$$$$$  |
    $$ |       \$$\$$  / $$  __|\______|$$  ____/ $$ \$$$$ |  $$ | \_____$$\\______|$$  __$$\ $$ \$$$$ |$$  __$$<
    $$ |  $$\   \$$$  /  $$ |           $$ |      $$ |\$$$ |  $$ | $$\   $$ |       $$ /  $$ |$$ |\$$$ |$$ /  $$ |
    \$$$$$$  |   \$  /   $$$$$$$$\      $$$$$$$$\ \$$$$$$  /$$$$$$\\$$$$$$  |        $$$$$$  |\$$$$$$  /\$$$$$$  |
     \______/     \_/    \________|     \________| \______/ \______|\______/         \______/  \______/  \______/
------------------------------------------------------------------------------------------------------------------


**Copyright 2016 © Payatu Technologies Pvt. Ltd.**


Improper handling of new line and white space character caused Out of Bound Read in **`CDOMStringDataList::InitFromString`**.
This flaw can be used to leak the base address of **`MSHTML.DLL`** and effectively bypass **`Address Space Layout Randomization`**.


Affected Version
-----------------
* **Internet Explorer 9**
* **Internet Explorer 10**
* **Internet Explorer 11**


Test Bed
--------
* **IE: 10 & 11**
* **KB: KB3087038**
* **OS: Windows 7 SP1 x86**


Advisory
--------
* [**http://www.payatu.com/advisory-ie_cdomstringdatalist/**](http://www.payatu.com/advisory-ie_cdomstringdatalist/)
* [**https://technet.microsoft.com/library/security/MS15-112**](https://technet.microsoft.com/library/security/MS15-112)
* [**http://www.zerodayinitiative.com/advisories/ZDI-15-547/**](http://www.zerodayinitiative.com/advisories/ZDI-15-547/)


Blog Post
---------
[**http://www.payatu.com/from-crash-to-exploit/**](http://www.payatu.com/from-crash-to-exploit/)


Author
------

> **Ashfaq Ansari**

> ashfaq[at]payatu[dot]com

> **[@HackSysTeam](https://twitter.com/HackSysTeam) | [Blog](http://hacksys.vfreaks.com/ "HackSys Team") | [null](http://null.co.in/profile/411-ashfaq-ansari)**

> ![Payatu Technologies](http://www.payatu.com/wp-content/uploads/2015/04/Payatu_Logo.png "Payatu Technologies Pvt. Ltd.")

> [http://www.payatu.com/](http://www.payatu.com/ "Payatu Technologies Pvt. Ltd.")


Workshop Conducted
------------------
* [**From Crash to Exploit: CVE-2015-6086**](https://null.co.in/events/158-pune-null-pune-humla-16-january-2016-from-crash-to-exploit)

------------------------------------------------------------------------------------------------------------------


[**http://hacksys.vfreaks.com**](http://hacksys.vfreaks.com)

![HackSys Team](http://hacksys.vfreaks.com/wp-content/themes/Polished/images/logo.png)
File Snapshot

[4.0K] /data/pocs/25e9ac6d2aa6862df462b4dccb2bee448720b664 ├── [1.5K] BreakPoints.txt ├── [3.2K] Challenge-1-HeapAlignment.html ├── [ 354] DisableMemoryProtector.reg ├── [ 286] EnableMemoryProtector.reg ├── [3.8K] ExploitationChallengesAnalysis.txt ├── [1.2K] InitFromString.cpp ├── [5.9K] LFH-MemoryProtectorDisabledAnalysis.txt ├── [3.9K] LFH-MemoryProtectorDisabled.html ├── [3.9K] LFH-MemoryProtectorEnabledAnalysis.txt ├── [4.8K] LFH-MemoryProtectorEnabled.html ├── [ 34K] LICENSE ├── [ 11K] OOB_Read_IE10_IE11_ASLR_Bypass.html ├── [3.0K] README.md ├── [3.0K] ReadRequiredFeaturesAttribute-1.html ├── [3.3K] ReadRequiredFeaturesAttribute-2.html ├── [7.4K] TriggerAnalysis.txt └── [2.9K] Trigger.html 0 directories, 17 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.