In the first part of our three-part blog entry about HTML_EXPLOYT.AE, we provided an analysis on how HTML_EXPLOYT.AE uses Microsoft XML Core Services vulnerability (CVE-2012-1889). As previously discussed, HTML_EXPLOYT.AE has three key features: its usage of Microsoft XML Core Services, use of heap spray technique, and No ROP (Return-Oriented-Programming) function. In the second part of this three-part series, we will now focus on how HTML_EXPLOYT.AE uses the heap spray technique.
HTML_EXPLOYT.AE Feature 2 : Heap Spray
When we checked the error codes below using Windbg, HTML_EXPLOYT.AE uses heap overflow instead of stack overflow to refer to an object and call its virtual function. Heap Spray is a technique used in exploits in order to facilitate arbitrary code execution.
Fortunately, Trend Micro users need not worry as they are protected from this threat via Smart Protection NetworkT, which detects HTML_EXPLOYT.AE. In addition, both Trend Micro Deep Security and OfficeScan with IDF enabled prevent attacks exploiting CVE-201-1889 via the rule 1005061- Microsoft XML Core Services Remote Code Execution Vulnerability (CVE-2012-1889).
In the last installation of our 3-part series about this exploit, we will share our findings regarding the third feature of HTML_EXPLOYT.AE: No ROP function.
Leave a reply