按 Enter 到主內容區
:::

TWCERT-電子報

:::

[FireEye] Adobe公司與微軟公司的零日漏洞(Zero-Day Exploits)可能遭俄

發布日期:
字型大小:
  • 發布單位:TWCERT/CC
  • 更新日期:2019-03-22
  • 點閱次數:807

April 18, 2015 | By Fireeye Labs | Threat Research

FireEye Labs recently detected a limited APT campaign exploiting zero-day vulnerabilities in Adobe Flash and a brand-new one in Microsoft Windows. Using the Dynamic Threat Intelligenc April 18, 2015 | By Fireeye Labs | Threat Research

FireEye Labs recently detected a limited APT campaign exploiting zero-day vulnerabilities in Adobe Flash and a brand-new one in Microsoft Windows. Using the Dynamic Threat Intelligence Cloud (DTI), FireEye researchers detected a pattern of attacks beginning on April 13th, 2015. Adobe independently patched the vulnerability (CVE-2015-3043) in APSB15-06. Through correlation of technical indicators and command and control infrastructure, FireEye assess that APT28 is probably responsible for this activity.

Microsoft is aware of the outstanding local privilege escalation vulnerability in Windows (CVE-2015-1701). While there is not yet a patch available for the Windows vulnerability, updating Adobe Flash to the latest version will render this in-the-wild exploit innocuous. We have only seen CVE-2015-1701 in use in conjunction with the Adobe Flash exploit for CVE-2015-3043. The Microsoft Security Team is working on a fix for CVE-2015-1701.

【Exploit Overview】
The high level flow of the exploit is as follows:
1.User clicks link to attacker controlled website
2.HTML/JS launcher page serves Flash exploit
3.Flash exploit triggers CVE-2015-3043, executes shellcode
4.Shellcode downloads and runs executable payload
5.Executable payload exploits local privilege escalation (CVE-2015-1701) to steal System token

The Flash exploit is served from unobfuscated HTML/JS. The launcher page picks one of two Flash files to deliver depending upon the target’s platform (Windows 32 versus 64bits).

The Flash exploit is mostly unobfuscated with only some light variable name mangling. The attackers relied heavily on the CVE-2014-0515 Metasploit module, which is well documented. It is ROPless, and instead constructs a fake vtable for a FileReference object that is modified for each call to a Windows API.

The payload exploits a local privilege escalation vulnerability in the Windows kernel if it detects that it is running with limited privileges. It uses the vulnerability to run code from userspace in the context of the kernel, which modifies the attacker’s process token to have the same privileges as that of the System process.

(資料來源: )

 

參考連結: https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html

回頁首