lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040625184635.GL1902@securityfocus.com>
Date: Fri, 25 Jun 2004 12:46:35 -0600
From: David Ahmad <da@...urityfocus.com>
To: bugtraq@...urityfocus.com, incidents@...urityfocus.com
Subject: Symantec DeepSight Threat Management System Analysis: Client-side Exploitation


Good day,

Symantec has made two reports available to the public, listed at 
the end of this post.  These documents describe instances of 
client-side exploitation.  At least one instance appears to 
involve an attacker with criminal intent targeting an individual 
at a financial institution.

I'm going to do something I almost never do (and try to
avoid), and that's deliver a frank soapbox rant.  Before that, 
I would like to acknowledge the work of the following individuals, 
without whom, many of these threats would remain unknown
(apologies to any I've left out):

http-equiv
Liu Die Yu
Drew Copely & eEye
Jelmer
Georgi Guninski
GreyMagic Security
Dror Shalev
Thor Larholm
Roozbeh Afrasiabi
Andreas Sandblad
Marc Slemko

Client-side exploitation is nothing new.  We have seen and 
discussed the potential risk posed by Microsoft Internet 
Explorer (and to a lesser extent, other client applications) 
for some time.  In fact, Symantec Internet Security Threat 
Reports in the past have warned repeatedly of these issues 
specifically as future threats. 

There is really no surprise, though.  It was only a matter of 
time before attackers caught on.  I've said this before -- it's 
difficult for me to think of a better class of vulnerabilities: 
no dependence on version or memory layout or any other such messy 
factors, firewalls are totally irrelevant and VPNs become basically 
a free ride in, the browser doesn't end up crashing (i.e. the 
victim remains blissfully unaware that they've been owned).. 
and there seems to be an endless supply of new tricks to use, 
thanks to the labyrinthine complexity of components, subcomponents 
and the genetically mutated frankenstein* of an access control 
mechanism that is supposed to hold it all together.  Finally, to 
top it all off, when a bug has been patched.. you never know if 
it has really been patched, because you're not even entirely 
sure where or what the bug is.  Often these vulnerabilities are 
not single flaws, but combinations of bad behavior and weaknesses 
put together.  Fix one avenue of attack and it only takes the 
discovery of another (usually code execution in Local Zone) to 
recreate the original attack.  Recall the longevity of "CODEBASE" 
and other similar "non-vulnerabilities".

Part of the problem is that MSIE has the worst feature creep that I 
have ever seen.  This "thing" is now used as, fundamentally, an 
interface presentation tool.  The browser is used for anything and 
everything you could possibly want it to: e-mail, applications,
file management, multimedia...  and where the browser as an entire 
application isn't used, the HTML rendering component often is.

I do my best to maintain an unbiased stance.  I think that the 
other browsers are probably just as bad, to the extent possible as 
they are not as complex and integrated into the operating system 
as MSIE.  But this is the reality, folks.  

Microsoft's effort so far to understand and fix these problems one 
at a time is commendable.  They are probably the best commercial 
vendor for responding to and correcting security issues.

On the bright side, XP SP2 looks like it make some desperately 
needed changes.  Let's hope a fundamental redesign is in the works 
too, because that looks like the only solution to me.  

Until then, try to make the most of your Interweb experience with 
basically every option in the MSIE security settings set to 
"Disable".  Then again, why bother worrying about another
hole in IE, or anything else for that matter.  The average home PC
is already beyond compromised with about 50 different individual 
instances of malicious code and IRC bots and spyware all competing
with each other to log keystrokes, turn on your webcam and bind 
backdoor servers to listening ports.  

Cheers.

* e.g. tripping on "document" vs "Document"

--

The reports are available at:

http://tms.symantec.com/ClientSideExploitation.asp

Client-side Exploits: Forensic Analysis of a Compromised 
Financial Services Laptop 

This document details the forensic analysis of a machine 
compromised through the use of a client-side vulnerability. 
The evidence gathered in this analysis strongly suggests that 
this client-side attack was used to specifically target a 
financial institution, with the goal of retrieving the necessary 
authentication credentials to escalate the initial attack to 
further compromise other related systems. The analysis of 
this compromise provides us with a real-world example of 
targeted attacks against a specific company, in this case, a 
company in the Financial Services sector using a client-side 
attack vector. Although not new, the targeted exploitation of 
client-side vulnerabilities has not seen extensive documentation 
or analysis. This analysis aims to provide the reader with a 
detailed description of an actual attack exploiting a client-side 
vulnerability. 

http://tms.symantec.com/documents/040617-Analysis-FinancialInstitutionCompromise.pdf

Compromised IIS Server / Unpatched Internet Explorer 
Vulnerability Exploitation Alert 

The DeepSight Threat Analyst Team has become aware of various 
public reports of Microsoft Internet Information Services (IIS) 
servers being attacked and subsequently compromised. As a second
component of the compromise, a malicious JavaScript is hosted 
on the infected IIS system and inserted into files served from 
that system. This document contains information about the 
vulnerabilities used and the subsequently deployed malcode, which 
is not available elsewhere. The malicious JavaScript in question 
is designed to compromise client systems through multiple known, 
but unpatched vulnerabilities in Internet Explorer. The resulting 
client-side infection includes, among other things, a keystroke 
logger. The Threat Analyst Team has manually captured a sample of 
the IE exploit, and resulting binary, in the DeepSight Honeynet 
system. Further investigation of the exploit resulted in the 
conclusions described below. UPDATE: This Threat Alert has been 
updated to include additional information about the client side 
exploits used in this attack. Additional information about other 
associated files has also been added. 

http://tms.symantec.com/documents/040624-Alert-CompromisedIISServerReports.pdf

-- 
David Mirza Ahmad
Symantec 

PGP: 0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ