期刊文献+

ActiveX控件中不安全方法漏洞的检测技术 被引量:5

Insecure method vulnerability detection in ActiveX controls
下载PDF
导出
摘要 针对ActiveX漏洞被攻击者频繁地使用来攻击系统和由不安全方法引起的漏洞可能会允许远程攻击者任意地访问本地资源的问题,介绍了检查ActiveX控件中不安全漏洞的一般方法,并且使用该方法对几款国内软件进行测试,实验表明该方法能有效挖掘到不安全方法漏洞。 ActiveX vulnerabilities are frequently used by attackers. Vulnerability caused by unsafe method may allow remote attackers access arbitrary local resource. The paper proposes a general method of checking ActiveX vulnerability. The effectiveness of this method has been proved by experiments on several domestic software.
出处 《微型机与应用》 2010年第6期60-62,66,共4页 Microcomputer & Its Applications
关键词 ACTIVEX控件 不安全方法 漏洞 ActiveX controls insecure methOd vulnerability
  • 相关文献

参考文献9

  • 1NVD [DB/OL]. [2009-10-01 ]. http ://nvd. nist. gov.
  • 2WARLORD.ActiveX-Active Exploitation[EB/OL].[2009- 10- 01 ]. http ://pac ketstormsecurity, org / papers / attack / activex. pdf.
  • 3Safe Initialization and Scripting for ActiveX Controls[EB/OL]. [ 2009-10- 01 ]. http://msdn2. microsoft, com/en- us/library/ aa751977, aspx.
  • 4DORMANN W.Internet Explorer Kill-Bits[EB/OL].[2009- 10-1 ]. http://www. cert. org/blogs/vuls/2009/07/internet_ explorer_kill- bits. html.
  • 5DORMANN W,PLAKOSH D.Vulnerability detection in ActiveX controls through automated fuzz testing[R].Pittsburgh : CERT, 2009.
  • 6ActiveX Security:Improvements and Best Practices[EB/OL]. [2009-10-1 ]. http ://msdn. microsoft, com/en-us/library/ bb250471 (VS. 85). aspx.
  • 7HOWARDM,LEBLANCD.编写安全的代码(第2版)[M].程永敬,译.北京:机械工业出版社,2005:50.
  • 8String[CP].[2OO9-10-O1].http ://technet.microsoft.com/zhcn/sysinternals/bb897439(en-us).aspx.
  • 9UUSee网络电视2008UUUpgradeActiveX控件Update方式任意文件下载漏洞[EB/OL].[2009-10-01].http://www.nsfocus.net/vulndb/12075.

同被引文献25

  • 1白建坤.W eb服务安全架构研究[J].计算机应用,2005,25(11):2533-2535. 被引量:8
  • 2徐歆恺,葛庆平,崔武子.基于Windows GDI+的几何形状测量[J].电脑开发与应用,2007,20(2):34-35. 被引量:2
  • 3Warlord. ActiceX-Active Exploitation [EB/OL], packetstormsecurity.org/papers/attack/activex.pdf.
  • 4Vangipuram Lakshmikanthm, Syamal Sen. Computational error and complexity in science and engineering[M].Amsterdam, the Netherlands,ELSEVIER,Included in series Journal: Mathemati- cs in Science and Engineering,2005.
  • 5段永朝.Bug--信息时代的阴影[N].中国计算机报,1998-3-2,705(a23).
  • 6Jason Deckard. Buffer overflow attacks[M].Burlington,MA, US: Syngress Publishing,2005:1-340.
  • 7Zoltan Csizmadia. GDI+and MFC memory leak detection [EB/ OL]. http://www.codeproj ect.com/KB/GDI-plus/gdiplush.aspx, 2003.
  • 8Microsoft Corp. Microsoft MSDN for visual studio 2005 [Z]. 2005.
  • 9国家信息安全漏洞共享平台.ActiveX漏洞统计[DB/OI.].[2011-10-29].http://www.cnvd.org.cn.
  • 10灰帽首发-UUSee6.11.0412.1内存破坏远程执行漏洞[EB/OL].[2011-10-29].http://www.huimaozi.neff?p=122.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部