精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

可緩解Internet Explorer 6/7攻擊的cpp代碼

安全 應用安全
遠程執行##遠程攻擊##立即處理[msg]Dirty mitigation for the Internet Explorer 6/7 - getElementsByTagName Body Style

Dirty mitigation for the Internet Explorer 6/7 - getElementsByTagName Body Style

Code:

/* 

This code is for a DLL that loads into Internet Explorer as a BHO and 
modifies MSHTML.DLL in memory to render attempts to exploit this new 
IE vulnerability inert. It does that by forcing a "controlled crash" 
at a high address, instead of letting EIP reach an MSHTML-dependent 
address that could fall within the heap-sprayable zone. It's not a 
patch, or a "fix" in any pure sense -- it's just a mitigation. 

The vulnerability details I've figured out are that 
MSHTML!CDispNode::SetExpandedClipRect ORs a CDispScroller instance's 
vtable pointer by 2, then MSHTML!CLayout::GetFirstContentDispNode 
tries to call a function (at +2Ch on IE 6, +30h on IE 7) from the 
vtable. This makes exploitability completely dependent on the 
system's version of MSHTML.DLL, and all but rules out successful 
exploitation in 64-bit Internet Explorer. 

The mitigation works by replacing one function pointer in the vtable 
with a pointer for which the low 2 bytes are 0xCCCC, but at which the 
code is functionally equivalent. Legitimate virtual function calls 
work will as usual, while exploitation attempts will arrive at EIP = 
0xCCCCxxxx (not exploitable) rather than 0xyyyyxxxx (exploitable for 
some yyyy). 

The following snippet is a pared-down, harmless proof-of-concept to 
illustrate the fundamental elements of the vulnerability. < and > 
have been replaced by # to avoid setting off alarms. 

#!DOCTYPE# 
#STYLE#* { margin: 0; overflow: scroll }#/STYLE# 
#BODY ONLOAD="document.getElementsByTagName('STYLE')[0].outerHTML++"# 

The !DOCTYPE tag is necessary to cause 
MSHTML!CFlowLayout::CalcSizeCore to call 
CFlowLayout::CalcSizeCoreCSS1Strict (the vulnerable code path) instead 
of CFlowLayout::CalcSizeCoreCompat. The STYLE needs to apply to the 
BODY, but the * illustrates that "body" appearing there shouldn't be 
relied upon when constructing any detection signatures. The ++ works 
as well as anything to modify 'outerHTML'. 

This code has received minimal testing and is not guaranteed to stop 
all attacks. Use it at your own risk. 

Thanks to MMM for the sacrificial system. Greets to the November birthday 
crew. 

-- Derek 

*/ 

//////////////////////////////////////////////////////////////// 
// iebsfix1.cpp 
//============================================================== 
// Dirty mitigation for the Internet Explorer 6/7 
// getElementsByTagName Body Style zero-day. Downgrades an 
// exploitation attempt to a harmless crash. 
// 
// This mitigation is for 32-bit (x86) Windows only -- it does 
// not work on 64-bit Windows, even though 64-bit Internet 
// Explorer is technically affected. 
// 
// To build: 
// 
// 1. Start Visual Studio 2008 (2005 should also work) 
// 2. File -> New -> Project 
// 3. Choose Visual C++: Win32: Win32 Project 
// 4. Enter "iebsfix1" for the name 
// 5. In the Win32 Application Wizard, choose an 
// "Application type" of "DLL", and under "Additional 
// options", check "Empty project" 
// 6. In the Solution Explorer, right-click on "Source Files", 
// Add -> New Item 
// 7. Choose "C++ File (.cpp)" and enter "iebsfix1.cpp" for 
// the name 
// 8. Paste all of this source code into the new .cpp file 
// 9. In the Solution Explorer, right-click again on "Source 
// Files", Add -> New Item 
// 10. Choose "Module-Definition File (.def)" and enter 
// "iebsfix1.def" for the name 
// 11. Paste everything in the block comment below (between the 
// rows of ****'s) into the new .def file 
// 12. Build -> Configuration Manager; for "Active solution 
// configuration", choose "Release" 
// 13. For maximum portability, Project -> Properties, 
// Configuration Properties: C/C++: Code Generation: set 
// "Runtime Library" to "Multi-threaded (/MT)"; this will 
// keep iebsfix1.dll from requiring MSVCR*.DLL 
// 14. (While you're in there, Project -> Properties, 
// Configuration Properties: Linker: Input, and make sure 
// that "Module Definition File" contains "iebsfix1.def") 
// 15. Build -> Build Solution 
// 
// To use, copy "iebsfix1.dll" to the Windows SYSTEM32 
// directory and run "regsvr32 iebsfix1.dll" as an 
// administrator. 
// 
// To uninstall, run "regsvr32 /u iebsfix1.dll". 
// 
// The DLL self-registers as a Browser Helper Object, but it 
// doesn't actually do anything BHO-like -- it just hooks 
// MSHTML.DLL during DllGetClassObject, then "fails." Being a 
// BHO is a convenient way to get loaded into Internet Explorer. 
// (Note that it may also load into Explorer.) If it can't 
// hook the system's MSHTML.DLL, it will display a message box 
// informing the user of the failure. 
// 
// NO WARRANTIES. Use at your own risk. Redistribution of this 
// source code in its original, unmodified form is permitted. 
// 
// Derek Soeder - 11/22/2009 
//////////////////////////////////////////////////////////////// 

/**** Paste the following into a new .def file: ************* 

LIBRARY "iebsfix1.dll" 

EXPORTS 
DllCanUnloadNow PRIVATE 
DllGetClassObject PRIVATE 
DllRegisterServer PRIVATE 
DllUnregisterServer PRIVATE 

***************************************************************/ 

#define IEBSFIX1_CLSID_W L"{802af903-a984-4481-8376-c103ade582e6}" 

#define WIN32_LEAN_AND_MEAN 
#define _CRT_NON_CONFORMING_SWPRINTFS 
#define _CRT_SECURE_NO_WARNINGS 

#include  
#include  
#include  

//////////////////////////////////////////////////////////////// 
// MSHTML!CDispScroller vtable hooking 
//////////////////////////////////////////////////////////////// 

PVOID * find_vtable_slot( 
HMODULE hmMSHTML ) 
{ 
PIMAGE_DOS_HEADER pmz; 
PIMAGE_NT_HEADERS32 ppe; 
UINT_PTR codestart; 
PBYTE pbcode; 
SIZE_T cbremain; 
UINT_PTR ptr; 
size_t i; 
PVOID * ppfn; 

pmz = (PIMAGE_DOS_HEADER) 
((UINT_PTR)hmMSHTML & ~(UINT_PTR)0xFFFFU); 
if (pmz->e_magic != IMAGE_DOS_SIGNATURE || pmz->e_lfanew <= 0) 
return NULL; 

ppe = (PIMAGE_NT_HEADERS32) 
((LONG_PTR)pmz + pmz->e_lfanew); 
if ( ppe->Signature != IMAGE_NT_SIGNATURE || 
ppe->FileHeader.Machine != IMAGE_FILE_MACHINE_I386 || 
ppe->OptionalHeader.Magic != 
IMAGE_NT_OPTIONAL_HDR32_MAGIC ) 
{ 
return NULL; 
} 

codestart = (UINT_PTR)pmz + ppe->OptionalHeader.BaseOfCode; 
pbcode = (PBYTE)codestart; 

// find instructions that assign to memory at [reg] a pointer 
// to constant data stored in the code section; vtable 
// pointer initialization instructions are a subset of these 

for ( cbremain = ppe->OptionalHeader.SizeOfCode; 
cbremain >= 7; pbcode++, cbremain-- ) 
{ // C7/0x/vtableptr -- MOV [reg], vtableptr 
if (pbcode[0] != 0xC7U) continue; 
if ( pbcode[1] <= 0x03 || // [EAX/ECX/EDX/EBX] 
pbcode[1] == 0x06 || // [ESI] 
pbcode[1] == 0x07 ) // [EDI] 
{ 
ptr = *(DWORD *)(pbcode + 2); 
} 
// C7/45/00/vtableptr -- MOV [EBP+0], vtableptr 
else if (pbcode[1] == 0x45 && pbcode[2] == 0x00) 
ptr = *(DWORD *)(pbcode + 3); 
else continue; 

// pointer to pointers, must be machine word aligned 

if ((ptr & 3) != 0) continue; 

// if it doesn't point to at least 25 code-section 
// pointers, we're not interested 

for (i = 0; i < 25; i++) 
{ 
if ( ptr < codestart || (ptr - codestart) >= 
ppe->OptionalHeader.SizeOfCode ) 
{ 
break; 
} 
} 

if (i < 25) continue; 

ppfn = (PVOID *)ptr; 

// IE 6: [11], [12], and [14] return 1; [13] returns 0 
// IE 7: [12], [13], and [15] return 1; [14] returns 0 
// (CalcDispInfoForViewport was inserted at [11]) 

if ( ppfn[11] == ppfn[12] && ppfn[11] != ppfn[13] && 
ppfn[11] == ppfn[14] ) 
{ 
ppfn += 11; 
} 
else if ( ppfn[12] == ppfn[13] && 
ppfn[12] != ppfn[14] && ppfn[12] == ppfn[15] ) 
{ 
ppfn += 12; 
} 
else continue; 

// 33/C0/40/C3 -- XOR EAX, EAX / INC EAX / RET 
// 6A/01/58/C3 -- PUSH 1 / POP EAX / RET 
if ( *(DWORD *)*ppfn == 0xC340C033U || 
*(DWORD *)*ppfn == 0xC358016AU ) 
{ 
return ppfn; 
} 
} //for(cbremain>=7) 

return NULL; 
} //find_vtable_slot 

BOOL apply_mitigation( 
PVOID * ppfnVTableSlot ) 
{ 
PBYTE pbhook; 
DWORD dwprot; 

// we "hook" the next vtable slot and make sure the two low 
// bytes of the function pointer are unusably high, so the 
// call to [ppfnVTableSlot | 2] will always crash 

pbhook = (PBYTE) VirtualAlloc( NULL, 0x10000, 
MEM_COMMIT|MEM_RESERVE, PAGE_EXECUTE_READWRITE ); 

if (pbhook == NULL) return FALSE; 

memset( pbhook, 0xF4U, 0x10000 ); // F4 -- HLT 

// 33/C0/40/C3 -- XOR EAX, EAX / INC EAX / RET 
*(DWORD *)(pbhook + 0xCCCCU) = 0xC340C033U; 

// see? now the virtual method does its "return 1" at address 
// xxxxCCCC instead of at whatever address inside MSHTML.DLL; 
// it'll still work fine, but those two low bytes of CCCC will 
// "poison" the exploit 

VirtualProtect( pbhook, 0x10000, PAGE_EXECUTE_READ, &dwprot ); 

FlushInstructionCache( GetCurrentProcess(), pbhook, 0x10000 ); 

// set the hook 

if ( !VirtualProtect( ppfnVTableSlot + 1, 
sizeof(ppfnVTableSlot[1]), PAGE_EXECUTE_READWRITE, 
&dwprot ) ) 
{ 
VirtualFree( pbhook, 0, MEM_RELEASE ); 
return FALSE; 
} 

ppfnVTableSlot[1] = (pbhook + 0xCCCCU); 

VirtualProtect( ppfnVTableSlot + 1, sizeof(ppfnVTableSlot[1]), 
dwprot, &dwprot ); 

FlushInstructionCache( GetCurrentProcess(), 
ppfnVTableSlot + 1, sizeof(ppfnVTableSlot[1]) ); 

return TRUE; 
} //apply_mitigation 

//////////////////////////////////////////////////////////////// 
// Browser Helper Object DLL 
//////////////////////////////////////////////////////////////// 

HINSTANCE g_hinstMyself; 
BOOL g_fInitialized; 
CRITICAL_SECTION g_csInit; 

HMODULE g_hmMSHTML; 

STDAPI DllUnregisterServer() 
{ 
HKEY hkey, hkey2, hkey3; 

if ( RegOpenKeyW( HKEY_LOCAL_MACHINE, L"SOFTWARE\\" 
L"Classes\\CLSID", &hkey ) == ERROR_SUCCESS ) 
{ 
if ( RegOpenKeyW( hkey, IEBSFIX1_CLSID_W, 
&hkey2 ) == ERROR_SUCCESS ) 
{ 
if ( RegOpenKeyW( hkey2, L"InprocServer32", 
&hkey3 ) == ERROR_SUCCESS ) 
{ 
RegDeleteValueW( hkey3, NULL ); 
RegCloseKey( hkey3 ); 
RegDeleteKeyW( hkey2, 
L"InprocServer32" ); 
} 

RegCloseKey( hkey2 ); 
RegDeleteKeyW( hkey, IEBSFIX1_CLSID_W ); 
} 

RegCloseKey( hkey ); 
} 

if ( RegOpenKeyW( HKEY_LOCAL_MACHINE, L"SOFTWARE\\Microsoft\\" 
L"Windows\\CurrentVersion\\Explorer", 
&hkey ) == ERROR_SUCCESS ) 
{ 
if ( RegOpenKeyW( hkey, L"Browser Helper Objects", 
&hkey2 ) == ERROR_SUCCESS ) 
{ 
RegDeleteKeyW( hkey2, IEBSFIX1_CLSID_W ); 
RegCloseKey( hkey2 ); 
RegDeleteKeyW( hkey, 
L"Browser Helper Objects" ); 
} 

RegCloseKey( hkey ); 
} 

return S_OK; 
} //DllUnregisterServer 

STDAPI DllRegisterServer() 
{ 
HKEY hkey, hkey2; 
WCHAR wszmod[1024]; 
LSTATUS lret; 

if ( RegCreateKeyW( HKEY_LOCAL_MACHINE, 
L"SOFTWARE\\Classes\\CLSID\\" IEBSFIX1_CLSID_W 
L"\\InprocServer32", &hkey ) != ERROR_SUCCESS ) 
{ 
_fail: 
DllUnregisterServer(); 
return SELFREG_E_CLASS; 
} 

GetModuleFileNameW( g_hinstMyself, wszmod, 
(sizeof(wszmod) / sizeof(wszmod[0])) ); 

lret = RegSetValueW( hkey, NULL, REG_SZ, wszmod, 
(wcslen( wszmod ) + 1) * sizeof(wszmod[0]) ); 

RegCloseKey( hkey ); 

if (lret != ERROR_SUCCESS) goto _fail; 

if ( RegCreateKeyW( HKEY_LOCAL_MACHINE, L"SOFTWARE\\" 
L"Microsoft\\Windows\\CurrentVersion\\Explorer\\" 
L"Browser Helper Objects", &hkey ) != ERROR_SUCCESS ) 
{ 
goto _fail; 
} 

lret = RegCreateKeyW( hkey, IEBSFIX1_CLSID_W, &hkey2 ); 

RegCloseKey( hkey ); 

if (lret != ERROR_SUCCESS ) goto _fail; 

RegCloseKey( hkey2 ); 

return S_OK; 
} //DllRegisterServer 

STDAPI DllCanUnloadNow() 
{ 
return S_OK; 
} 

STDAPI DllGetClassObject( 
REFCLSID rclsid, 
REFIID riid, 
LPVOID * ppv ) 
{ 
PVOID * ppfn; 
WCHAR wszbuf[256]; 

EnterCriticalSection( &g_csInit ); 

__try 
{ 
if (!g_fInitialized) 
{ 
// MSHTML should already be loaded; this extra 
// reference will keep it from ever unloading 
g_hmMSHTML = LoadLibraryW( L"mshtml.dll" ); 

ppfn = find_vtable_slot( g_hmMSHTML ); 

if (ppfn != NULL) 
{ 
swprintf( wszbuf, 
L"IEBSFix1: Found vtable slot at %p in MSHTML_%p\r\n", 
ppfn, g_hmMSHTML ); 
OutputDebugStringW( wszbuf ); 

apply_mitigation( ppfn ); 
} 
else 
{ 
swprintf( wszbuf, 
L"IEBSFix1: FAILED to find vtable slot in MSHTML_%p\r\n", 
g_hmMSHTML ); 
OutputDebugStringW( wszbuf ); 

MessageBoxW( NULL, 
L"The Internet Explorer 6/7 getElementsByTagName Body Style zero-day " 
L"mitigation, also known as IEBSFix1, is not protecting your system " 
L"because it is incompatible with this version of Internet Explorer." 
L"\n\nTo remove IEBSFix1, run \"regsvr32 /u iebsfix1.dll\" as an " 
L"administrator.", 
L"IEBSFix1", MB_ICONWARNING|MB_OK ); 
} 

g_fInitialized = TRUE; 
} 
} 
__finally 
{ 
LeaveCriticalSection( &g_csInit ); 
} 

return CLASS_E_CLASSNOTAVAILABLE; 
} //DllGetClassObject 

BOOL WINAPI DllMain( 
HINSTANCE hinstDLL, 
DWORD fdwReason, 
LPVOID lpvReserved ) 
{ 
if (fdwReason == DLL_PROCESS_ATTACH) 
{ 
g_hinstMyself = hinstDLL; 
g_fInitialized = FALSE; 
InitializeCriticalSection( &g_csInit ); 
} 

return TRUE; 
} //DllMain

【編輯推薦】

  1. 系統安全基礎之對IE瀏覽器優化設置
  2. 微軟IE7瀏覽器十大安全要點
  3. 安全專家稱火狐IE瀏覽器同時使用存在安全危險
責任編輯:安泉 來源: 黑客防線
相關推薦

2012-08-24 13:37:59

Internet Ex瀏覽器

2011-09-06 10:02:06

IE9Windows 7Forresten

2009-02-24 08:22:53

Internet ExIE8RTM

2010-09-16 08:59:41

2010-12-29 14:32:38

2011-08-18 09:26:45

IE

2010-12-28 15:15:32

2012-12-12 16:16:19

微軟IE10Windows 8

2019-02-26 15:05:54

Windows 10Internet Ex

2010-10-09 11:20:13

2013-11-08 09:48:50

IEIE11

2011-03-16 11:27:31

微軟IE9

2010-12-20 15:04:57

加載項管理

2012-03-20 13:27:31

Internet Ex

2011-03-22 18:52:56

IE9微軟中國

2009-03-15 10:09:56

IE8瀏覽器進程模型

2020-08-28 10:09:20

微軟Internet ExWindows 10

2010-04-23 14:52:17

Internet Ex

2021-05-25 14:06:35

MicrosoftIE瀏覽器

2019-02-13 14:33:13

點贊
收藏

51CTO技術棧公眾號

国产小视频免费观看| 欧美性受xxxx黑人xyx| 国产精彩精品视频| 非洲一级黄色片| 日本欧美日韩| ...av二区三区久久精品| 91精品久久久久久久久中文字幕| 国产真人做爰视频免费| 亚洲美女色播| 亚洲综合色区另类av| 国产精品一区二区三区四区五区 | 潘金莲一级淫片aaaaa免费看| 国产精品欧美久久久久天天影视| 欧美日韩国产探花| 日韩精品视频在线免费观看| 青青青在线视频免费观看| 麻豆传媒视频在线观看免费| 国产成人免费视频网站高清观看视频| 欧美激情在线一区| 亚洲精品国产一区黑色丝袜| 激情五月综合婷婷| 福利二区91精品bt7086| 亚洲一区二区三区精品动漫| 亚洲精品成av人片天堂无码 | 成人h动漫精品一区二区器材| 丁香五六月婷婷久久激情| 日韩免费电影一区二区三区| a级片在线视频| 亚洲一区观看| 美女视频黄免费的亚洲男人天堂| avtt香蕉久久| 亚洲视频自拍| 日韩欧美在线字幕| 国产树林野战在线播放| 青青草超碰在线| 国产精品18久久久| 国产精品久久久久国产a级| 日本老熟俱乐部h0930| 久久久精品国产**网站| 在线观看欧美精品| 国产一区二区视频播放| 黄网站在线免费| 丁香另类激情小说| 国产一区二区色| 中文字幕激情小说| 中文在线播放一区二区| 亚洲一级黄色片| 国产高清成人久久| 国产亚洲亚洲国产一二区| 日韩欧美在线视频| aa在线观看视频| www红色一片_亚洲成a人片在线观看_| 99精品视频一区| 91亚洲精品久久久久久久久久久久| www.国产com| 亚洲精品孕妇| 欧美激情一区二区三级高清视频 | 九九免费精品视频在线观看| 精品国产凹凸成av人网站| 欧美日韩亚洲一二三| 黄色片网站在线| 欧美激情综合在线| 欧美日韩在线精品一区二区三区| 免费激情视频在线观看| 日韩一区二区三区四区视频| 久久99高清| 亚洲第一中文字幕| 农村末发育av片一区二区| 欧美在线se| 欧美日韩一二三区| 国产在线青青草| 国产精品一区二区日韩| 午夜精品一区在线观看| 日韩精品久久一区二区| 老司机在线永久免费观看| 2021国产精品久久精品| 久久久精品国产一区二区三区| 农村少妇久久久久久久| 国产精品一区二区在线观看不卡| 成人欧美一区二区三区黑人| 在线观看xxxx| 精品一区二区三区免费观看| 成人欧美一区二区三区在线湿哒哒 | 91禁在线看| 五月天网站亚洲| 男人天堂手机在线视频| 91www在线| 午夜av一区二区三区| 99精品在线免费视频| 综合久久2o19| 亚洲一级二级在线| 黄色小视频大全| 特级毛片在线| 午夜久久久久久| 人妻无码视频一区二区三区| 色猫猫成人app| 欧美日韩成人综合| 人妻少妇偷人精品久久久任期| 91麻豆精品激情在线观看最新 | 国产精品成av人在线视午夜片| 中文字幕xxxx| 精品在线免费视频| 国产欧美精品一区二区三区-老狼| 亚洲中文一区二区三区| 国产东北露脸精品视频| 国产视频精品网| 成人在线免费视频| 国产片一区二区| 天天干天天色天天爽| 后进极品白嫩翘臀在线播放| 色视频成人在线观看免| 国内外免费激情视频| 97久久中文字幕| 欧美不卡在线视频| 丝袜美腿中文字幕| 99精品美女| 97人人模人人爽人人喊中文字| 中国精品一区二区| 国产成人免费高清| 日韩.欧美.亚洲| 色呦呦在线资源| 91久久精品国产91性色tv| 宇都宫紫苑在线播放| 亚洲婷婷丁香| 免费91在线视频| 在线永久看片免费的视频| 国产精品一区二区果冻传媒| 蜜桃导航-精品导航| 国产剧情在线| 欧美中文字幕一二三区视频| 免费不卡的av| 婷婷亚洲五月色综合| 97久久精品人人澡人人爽缅北| 天天操夜夜操视频| 国产福利一区二区三区视频| 性欧美videosex高清少妇| 白浆在线视频| 欧美一级黄色片| 第一次破处视频| 国产一区导航| 国产高清一区视频| 欧美一区二区三区在线观看免费| 午夜精品福利一区二区三区蜜桃| gai在线观看免费高清| 蜜乳av综合| 97国产成人精品视频| 国产精品毛片久久久久久久av| 国产清纯在线一区二区www| 日韩xxxx视频| 日韩毛片网站| 中文字幕成人在线| 狠狠人妻久久久久久综合| 成人动漫一区二区| 欧美国产视频一区| 美女精品视频在线| 久久激情视频久久| 91精东传媒理伦片在线观看| 欧美激情中文不卡| 成年网站在线免费观看| 日韩av中文字幕一区| 久久久久国色av免费观看性色 | 欧美一级欧美三级| 免费在线观看黄色小视频| 日韩中文字幕一区二区三区| 一区二区三区在线不卡| 亚洲精品免费一区二区三区| 午夜在线观看视频| 欧美日韩免费高清一区色橹橹| mm131美女视频| 99精品福利视频| 91性高湖久久久久久久久_久久99| 免费人成在线观看播放视频| 欧美日韩国产影院| 国产精品探花一区二区在线观看| 亚洲黄色av| 久久99导航| 涩涩涩视频在线观看| 亚洲精品久久久久久下一站 | 最新天堂中文在线| 成人区精品一区二区婷婷| 国产精品九九久久久久久久| 国产小视频在线观看| 日本高清不卡aⅴ免费网站| 国产美女免费网站| 麻豆视频一区二区| 日韩一区免费观看| 第四色男人最爱上成人网| 正在播放欧美一区| 亚洲综合精品国产一区二区三区| 成人欧美一区二区三区小说| 亚洲天堂伊人网| 国产精品mm| 麻豆精品蜜桃一区二区三区| 日本一区二区三区视频在线| 久久精品99久久久久久久久| 精品国产一级片| 午夜精品成人在线视频| 国产一级免费片| 激情六月综合| 日本一区二区高清视频| 日本午夜精品久久久久| 九九久久综合网站| 黄色小视频在线免费观看| 欧美精品在线一区二区三区| 美女视频黄免费| 91在线国产观看| 中日韩av在线播放| 亚洲国产精品一区| 亚洲草草视频| 欧美影院在线| 国产99久久精品一区二区 夜夜躁日日躁 | 亚洲国产综合网| 天天亚洲美女在线视频| 噜噜噜在线视频| 捆绑调教美女网站视频一区| 免费超爽大片黄| 久久影院100000精品| 精品国产一区二区三区麻豆小说 | 久久精品超碰| 高清一区二区三区四区五区| www.视频在线.com| 精品久久人人做人人爽| 伊人网中文字幕| 婷婷亚洲久悠悠色悠在线播放| 人妻无码一区二区三区| 可以免费看不卡的av网站| 日韩不卡一二区| 精品久久久久久久久久久下田| 91传媒视频在线观看| 国内自拍视频网| 狠狠操综合网| www.成人av| 日韩伦理一区二区| 国产91在线视频| 91九色在线播放| 久久久国产视频91| 国产资源在线观看| 亚洲黄色在线观看| 亚洲中文字幕在线一区| 午夜精品一区二区三区免费视频 | 成年人视频网站在线| 欧美人妖巨大在线| 特黄视频免费看| 国产精品久久久久久妇女6080 | 日韩精品一区二区免费| 成人女性视频| 欧美一级爱爱| 亚洲精品一级二级三级| 国产精品一区二区三区四区五区| 中文字幕系列一区| 日本三级久久久| 日本在线影院| 亚洲 日韩 国产第一| 17videosex性欧美| 欧美黑人巨大xxx极品| 超鹏97在线| 久久精品91久久香蕉加勒比| 在线播放毛片| 这里只有精品在线观看| 天堂在线资源8| 亚洲精品在线免费播放| 亚洲国产av一区二区| 欧美精品久久一区二区三区| 中文字幕一级片| 欧美日韩中字一区| 依依成人在线视频| 欧美日韩一区二区欧美激情 | 亚洲国产成人高清精品| 久久久综合久久久| 亚洲午夜久久久久久久久久久 | 亚洲精品国产精品国自产网站按摩| 欧美午夜宅男影院在线观看| 黄色片网站在线免费观看| 亚洲精品福利视频网站| 全程偷拍露脸中年夫妇| 亚洲一区在线观看网站| 日韩免费一二三区| 精品久久久久久中文字幕大豆网| 国产精品自拍99| 色av综合在线| 中文字幕一区二区久久人妻| 亚洲欧美日韩系列| 久久国产露脸精品国产| 亚洲成在人线在线播放| 亚洲第一精品在线观看| 欧美在线不卡视频| 国产视频在线观看免费| 亚洲电影天堂av| 蜜桃成人在线视频| 色午夜这里只有精品| 91麻豆免费在线视频| 性欧美xxxx| 成人看片网站| 91嫩草在线视频| 国产精品qvod| 偷拍视频一区二区| 综合久久一区| 国产精品igao激情视频| 欧美特黄a级高清免费大片a级| www.av中文字幕| 美女视频网站久久| www.555国产精品免费| 久久精品这里都是精品| 老司机成人免费视频| 亚洲大尺度视频在线观看| 国产黄色片免费看| 精品视频全国免费看| 亚洲成熟女性毛茸茸| 亚洲视频一区二区| 亚洲丝袜一区| 国产成人在线一区| 亚洲国产91视频| julia一区二区中文久久94| 久久爱www成人| 国产在线拍揄自揄拍无码| 亚洲另类黄色| 91热视频在线观看| 久久久久久久电影| 久久久精品少妇| 麻豆成人入口| 亚洲国产精品人久久电影| 91高清在线视频| 68精品久久久久久欧美| 精品久久福利| 精品国产乱码久久久久| 亚洲国产一区二区在线观看| 成人精品小视频| 99久久精品免费| 中文字幕av免费在线观看| 在线观看av一区| 网站黄在线观看| 欧美日韩国产二区| 久久久久久一区二区三区四区别墅| 久久国产精品99久久久久久丝袜| 国产精品精品国产一区二区| 成年人免费大片| 久久综合成人精品亚洲另类欧美| 久久久久久久久久免费视频 | 亚洲国产精品一区二区久久恐怖片 | 黄色片免费在线观看| 成人午夜一级二级三级| 在线中文一区| 久久久久久无码精品人妻一区二区| 亚洲视频小说图片| 99riav国产| 久久久久久久久久久人体| 欧美日韩导航| 欧美日韩在线中文| 欧美激情一区二区三区不卡| 最近中文字幕免费观看| 在线日韩精品视频| 色999久久久精品人人澡69| 天天干天天操天天干天天操| 国产一区二区伦理片| 国产亚洲第一页| 亚洲国产一区二区三区四区 | 国产精品夜色7777狼人| 欧美高清在线| 亚洲av综合色区无码另类小说| 亚洲国产成人av网| 国产在线视频网站| 国产一区二区香蕉| 午夜av免费观看| 欧美熟乱第一页| v片在线观看| 韩国成人一区| 日韩精品免费视频人成| 婷婷社区五月天| 精品国产伦一区二区三区观看体验| 成人观看网址| 日韩少妇中文字幕| 国模一区二区三区白浆| 国产无遮挡又黄又爽| 亚洲欧美色图片| va天堂va亚洲va影视| 日韩 欧美 视频| 国产欧美一区二区精品秋霞影院 | 亚洲黄色成人久久久| 国产精品一区二区久久精品爱涩 | 在线中文字幕-区二区三区四区| 高清国产在线一区| 久久久国产精品一区二区中文| 国产精品69久久久久孕妇欧美| 欧美成人a在线| 亚洲精品一区三区三区在线观看| 国风产精品一区二区| 26uuu亚洲| 国产人妖一区二区三区| 欧美一级bbbbb性bbbb喷潮片| 人体久久天天| av在线网站免费观看| 色婷婷综合久久| 国产乱码在线| 一区二区三区欧美成人| 97精品国产97久久久久久久久久久久| 中文在线字幕免费观| 午夜美女久久久久爽久久| 婷婷色综合网| 黄色片网站免费| 亚洲国产精品字幕|