[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000001c36cc0$d20ddb70$2b02a8c0@dcopley>
Date: Wed, 27 Aug 2003 10:29:50 -0700
From: "Drew Copley" <dcopley@...e.com>
To: "'Drew Copley'" <dcopley@...e.com>,
"'Fabio Pietrosanti (naif)'" <fabio@...trosanti.it>,
"'BUGTRAQ'" <BUGTRAQ@...urityfocus.com>
Subject: RE: EEYE: Internet Explorer Object Data Remote Execution Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Addendum: It has come to our attention that the file extension does not matter.
So, the only way people should be blocking is this is by blocking by this tag:
Content-Type: application/hta
Cheers.
> -----Original Message-----
> From: Drew Copley [mailto:dcopley@...e.com]
> Sent: Wednesday, August 27, 2003 10:03 AM
> To: 'Fabio Pietrosanti (naif)'; 'BUGTRAQ'
> Subject: RE: EEYE: Internet Explorer Object Data Remote
> Execution Vulnerability
>
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> If you wish, you can deny any traffic using:
>
> Content-Type: application/hta
>
> The fact is even IIS does not have that content type built
> in, and it does not need it. Further, the need for anyone to
> legitimately download a HTML Application would be extremely
> rare. (This is not saying HTML Applications are useless.)
>
> Object tags can have unsafe extensions in the data, for
> instance, base-64 encoded data is rather popular. (For
> whatever reason Frontpage automatically puts base-64 encoded
> data in some activex.)
>
>
>
> > -----Original Message-----
> > From: Fabio Pietrosanti (naif) [mailto:fabio@...trosanti.it]
> > Sent: Monday, August 25, 2003 2:45 AM
> > To: BUGTRAQ
> > Subject: Re: EEYE: Internet Explorer Object Data Remote
> > Execution Vulnerability
> >
> >
> > On Fri, Aug 22, 2003 at 11:27:33AM +0300, Nerijus Krukauskas wrote:
> > > In case anyone needs a SNORT rule to catch attempts to
> > exploit this
> > > vulnerability:
> > >
> > > #-----
> > > alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any
> (msg:"Internet
> > > Explorer Object Data Remote Execution Vulnerability"; \
> > > content:"F935DC22-1CF0-11D0-ADB9-00C04FD58A0B"; \
> > > nocase; flow:from_server, established; \
> > > reference:cve,CAN-2003-0532; \
> > > classtype:web-application-activity; rev:1;)
> > > #-----
> >
> > This rules catch the response with the exploit's payload from
> > the server that may change depending on the exploits so
> > matching the CLSID of WSH does not detect the "vulnerability"
> > beeing exploited but this specific exploits.
> >
> > Altought there are many way of exploiting this vuln without
> > using the Window Scripting Host, it's possible to use it in
> > many way like:
> >
> > - VBScript
> >
> > CreateObject("WScript.Shell")
> >
> > - JavaScript
> >
> > new ActiveXObject("WScript.shell");
> >
> > or like in the demostration with the <object> tag .
> >
> > The only way to detect it is to look at the data sent by the
> > client beeing exploited ( which can probably bypassed with
> > fancy mhtml base64 encoded e-mail or with an e-mail with a
> > link to a site available in https )
> >
> > For an effective signature we need a regexp that will catch
> > everything that start with <object, reach the field data= and
> > look at the end of the string inside
> > "" matching everything that's NOT an unsafe extension ( .exe,
> > .pif, .cab, etc, etc ) .
> >
> > In perl should be something like:
> >
> > /date="[^"]+\.(?!exe|bat|pif|cab|scr|etc|etc|antani)([^"])+?"/
> > ( tnx Md )
> >
> > Regards
> >
> > --
> >
> > Fabio Pietrosanti ( naif )
> > E-mail: fabio@...trosanti.it - naif@...tpj.org -
> > naif@...urezza.org PGP Key available on my homepage:
> http://fabio.pietrosanti.it/
> - --
> Security is a state of being, not a state of budget. rfp
> - --
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0
>
> iQA/AwUBP0zkYAkWkugjEnC3EQLRzQCfUA4X7X4q/kxhTTNpblyo17RHOwMAoMNy
> t87vTJIMNFpKj6/ESNba3hd0
> =RMqw
> -----END PGP SIGNATURE-----
>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0
iQA/AwUBP0zqjgkWkugjEnC3EQKOogCeNqFJC5wPvS9n3MNZRZIJY1OSLhwAnjMr
dPDmnRNq/T/WdXkcj+Bh3QY8
=YB1/
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists