lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <653D74053BA6F54A81ED83DCF969DF082D5C29@pivxes1.pivx.com>
Date: Thu, 19 Aug 2004 10:17:07 -0700
From: "Thor Larholm" <tlarholm@...x.com>
To: "Radoslav Dejanovic" <radoslav.dejanovic@...us.hr>,
	<bugtraq@...urityfocus.com>
Subject: RE: First vulnerabilities in the SP2 - XP ?...


> From: Radoslav Dejanović [mailto:radoslav.dejanovic@...us.hr] 
> > On Monday 16 August 2004 15:58, Jrme ATHIAS wrote:
> > http://www.heise.de/security/artikel/50051

> This might be SP2 bug only if the same bug can't be repeated 
> on pre-SP2 machine. Didn't test, but I think this is an old 
> trick. Anyone care to test it?

The entire concept of the Zone.Identifier altenate data stream is new to XPSP2. Whenever you download any file from the web IE will add an ADS called Zone.Identifier which specifies what IE security zone the file originated from. Later, when the user tries to execute this file, Explorer itself will check for this ADS. If it does not exist Explorer will simply execute the file as it has always done, but if it does exist and it specifies the Internet zone Explorer will then check for a valid digital signature. If such a signature is not found Explorer will prompt the user and ask whether to execute this unknown executable from an unknown publisher.

Regardless of whether we think this has a high practical impact the advisory from Jürgen does specify a way to circumvent a desired security functionality which has been addded to XPSP2. Circumventing a desired security functionality is always interested, especially seeing as this is one of many first steps in a move toward digitally signing all executables on the Windows platform.



Regards

Thor Larholm
Senior Security Researcher
PivX Solutions
23 Corporate Plaza #280
Newport Beach, CA 92660
http://www.pivx.com
thor@...x.com
Stock symbol: (PIVX.OB)
Phone: +1 (949) 231-8496
PGP: 0x4207AEE9
B5AB D1A4 D4FD 5731 89D6  20CD 5BDB 3D99 4207 AEE9

PivX defines a new genre in Desktop Security: Proactive Threat Mitigation. 
<http://www.pivx.com/qwikfix>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ