通信学报 ›› 2017, Vol. 38 ›› Issue (5): 96-107.doi: 10.11959/j.issn.1000-436x.2017104

• 学术论文 • 上一篇    下一篇

RTF数组溢出漏洞挖掘技术研究

乐德广1,2,3,龚声蓉1,吴少刚2,徐锋3,刘文生4   

  1. 1 常熟理工学院计算机科学与工程学院,江苏 常熟 215500
    2 苏州大学计算机科学与技术学院,江苏 苏州 215006
    3 中科梦兰电子科技有限公司,江苏 常熟 215500
    4 泉州市公安局公共信息网络安全监察支队,福建 泉州 362000
  • 修回日期:2017-04-05 出版日期:2017-05-01 发布日期:2017-05-28
  • 作者简介:乐德广(1975-),男,福建三明人,博士,常熟理工学院副教授,主要研究方向为信息安全与下一代互联网技术等。|龚声蓉(1966-),男,湖北天门人,博士,常熟理工学院教授、博士生导师,主要研究方向为图像处理与信息安全等。|吴少刚(1973-),男,安徽宿松人,博士,中科梦兰电子科技有限公司研究员,主要研究方向为计算机系统结构、并行与分布式计算等。|徐锋(1981-),男,江苏常熟人,中科梦兰电子科技有限公司高级工程师,主要研究方向为计算机体系结构及自主安全。|刘文生(1969-),男,福建泉州人,泉州公安局高级工程师,主要研究方向为网络安全。
  • 基金资助:
    国家自然科学基金资助项目(61202440);国家自然科学基金资助项目(61402057);江苏省产学研前瞻性联合研究基金资助项目(BY2016050-01);江苏省科技计划基金资助项目(BK20160411)

Research on RTF array overflow vulnerability detection

De-guang LE1,2,3,Sheng-rong GONG1,Shao-gang WU2,Feng XU3,Wen-sheng LIU4   

  1. 1 School of Computer Science &Engineering,Changshu Institute of Technology,Changshu 215500,China
    2 School of Computer Science and Technology,Soochow University,Suzhou 215006,China
    3 Lemote Electronic Technology Co.,Ltd.,Changshu 215500,China
    4 Public Information Network Safety Supervision Division,Quanzhou Municipal Public Security Bureau,Quanzhou,362000,China
  • Revised:2017-04-05 Online:2017-05-01 Published:2017-05-28
  • Supported by:
    The National Natural Science Foundation of China(61202440);The National Natural Science Foundation of China(61402057);The Production and Research Prospective Joint Research Project of Jiangsu Province(BY2016050-01);The Jiangsu Provincial Natural Science Foundation of China(BK20160411)

摘要:

在虚函数执行中,由于错误操作C++对象的虚函数表而引起数组溢出漏洞。通过攻击虚函数造成系统崩溃,甚至导致攻击者可直接控制程序执行,严重威胁用户安全。为尽早发现并修复此类安全漏洞,对该安全漏洞的挖掘技术进行深入研究,结合MS Word解析RTF文件和虚函数调用之间的联系,发现MS Word在解析异常的RTF文件时存在数组溢出漏洞,并进一步提出基于文件结构解析的Fuzzing测试方法来挖掘RTF数组溢出漏洞。在此基础上,设计了RTF数组溢出漏洞挖掘工具(RAVD,RTF array vulnerability detector)。通过RAVD对RTF文件进行测试,能够正确挖掘出数组溢出漏洞。实际的模糊测试表明,设计的工具相比传统的漏洞挖掘工具具有更高的挖掘效率。

关键词: RTF文件, 漏洞挖掘, Fuzzing测试, 数组溢出

Abstract:

When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.

Key words: RTF document, vulnerability detection, Fuzzing test, array overflow

中图分类号: 

No Suggested Reading articles found!