exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

baidu-dos.txt

baidu-dos.txt
Posted Sep 15, 2008
Authored by Gen LI, Ying Zhang

The Baidu Hi IM client software suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 602ed68ee92ed8b8f32f9dba4972fcf56eefc1660be589e5f567db054316a527

baidu-dos.txt

Change Mirror Download
Baidu Hi IM client software DoS bug, div zero make client crash

-- CVE ID:
Not assigned

-- Affected Vendors:
Baidu

-- Affected Products:
Baidu Hi IM software

-- Vulnerability Details:

Our automatic bug exploiting tools have found a DoS bug in Baidu Hi IM
client which is a popular IM software in China.
This bug is due to Baidu Hi client do not strictly check the login
response packet's content from server in NetSevice.dll, malicious
input can cause client crash by div zero exception .

-- Vendor Response:
I contacted with Baidu a month ago, no any response from Baidu.

-- Credit:
This vulnerability was discovered by:
Gen LI & Jun MA & Ying Zhang

More Detail :
(NetService.dll)


.text:1001FDB4 mov eax, [ebp+arg_C]
.text:1001FDB7 sar esi, 3
.text:1001FDBA cdq
.text:1001FDBB idiv esi ; cause div zero exception, and make client crash

let login response packet is an array : a[]

esi is from :
tmp1= a[0x29] + (a[0x2a]<<8) + (a[0x2b]<<0x10) + (a[0x2c]<<0x18) ;
when eip=0x100202ca
tmp2= a[0x2d] + (a[0x2e]<<8) + (a[0x2f]<<0x10) + (a[0x30]<<0x18) ;
when eip=0x100202ca
tmp3= a[0x2b]+(a[0x2c]<<8) + (a[0x2d]<<0x10) + (a[0x2e]<<0x18) ; when
eip=0x1001ef2f
tmp4 = (tmp3<0) ? 0xffffffff:0 ; when eip= 0x1001fdac

tmp5 = tmp4 & 0x7; when eip = 0x1001fdad
tmp6 = tmp3+tmp5; when eip = 0x1001fdb0
esi = tmp6>>3; when eip = 0x1001fdb7

if malicious input is proper, client will crash.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close