[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F66187B-5C9D-11D8-A5F9-00039359BF60@sackheads.org>
Date: Wed, 11 Feb 2004 08:19:31 -0600
From: Timothy J.Miller <cerebus@...kheads.org>
To: BUGTRAQ@...urityfocus.com
Subject: Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption
On Feb 10, 2004, at 4:16 PM, Tim Eddy wrote:
> Marc,
>
> If we remove the default exemptions for Kerberos & RSVP from IPSEC with
> the "NoDefaultExempt" registry key, this still passes IKE. Therefore is
> IKE vulnerable to the ASN bug?
Very likely, as IKE data is marshaled into ASN.1 format. The fun part
about ASN.1 is it's so damn useful you tend to use it *everywhere*.
Is anyone else wondering why MS didn't fix this with the last round of
ASN.1 decoding overflow vulnerabilities (remember the SNMP hole)? It's
basically the same problem.
-- Cerebus
Powered by blists - more mailing lists