lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <005001c65234$d320d880$8205010a@determina.com>
Date: Mon, 27 Mar 2006 22:57:05 -0800
From: "Determina Secure" <secure@...ermina.com>
To: <bugtraq@...urityfocus.com>, <focus-ids@...urityfocus.com>,
	<focus-ms@...urityfocus.com>, <ms-secnews@...urityfocus.com>
Subject: Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote "CreateTextRange()" Code Execution)


March 27, 2006

Determina Fix for CVE-2006-1359
(Zero Day MS Internet Explorer Remote "CreateTextRange()" Code Execution)



Overview & Instructions On Downloading The Free Determina Shield For 
CVE-2006-1359


Based on the same technology used in the VPS LiveShield product, Determina 
has engineered
a standalone fix that provides free and immediate protection to users 
worldwide that need
to protect systems from related attacks until such time as Microsoft issues 
its own patch.
Note that current Determina VPS customers do not have to apply this patch as 
they have been
protected against this attack without the need for any update.

The source code of the Shield is included in the download for review by any 
independent security expert.

This free, standalone fix from Determina can be downloaded from the 
following link:

DETCVE-2006-1359.msi
(www.determina.com/security_center/download/DETCVE-2006-1359.msi)
MD5: 85b8bfc1c30c6b4451a3ab803f49708b
SHA1: 308ae9a79e48adecf769fd50ac29ddc37a07d33c

Threat Severity
Critical;
There is currently no known vendor patch released for this vulnerability. 
Determina is aware
of multiple exploits circulating on the Internet that can compromise 
vulnerable systems.

This fix can be applied to:

Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6.0
Overview
This is a runtime fix for the IE createTextRange() vulnerability. It can be 
applied to Windows
2000, XP and 2003 systems running Internet Explorer 5.01 and 6.0. The 
vulnerability lies in the
MSHTML.DLL rendering engine which is loaded into many applications for HTML 
rendering, including
but not limited to Internet Explorer and Microsoft Office.

The installation of the fix consists of adding the fix DLL to the 
AppInit_DLLs registry key in

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

The MSI installer will do this automatically. This will enable loading this 
fix DLL into all the
vulnerable applications. The fix does not modify any file or application on 
the disk. It will only
modify the vulnerable applications and DLLs in memory. The fix will not be 
applied to any processes
that are running at the time of the installation. To enable the patch, you 
have to restart IE, Outlook
and any other process that need to be protected. After the installation, run 
status.exe to verify that
your system is protected. If you have a version of MSHTML.DLL that the patch 
does not support,
status.exe will report that the protection is not active.

Once Microsoft releases an official patch and it is installed by the user, 
the Determina Shield will
not be applied any more. Determina recommends uninstalling this fix even 
though keeping it active will
not affect the system. To uninstall the fix, use "Add Remove Programs" in 
the Control Panel. To uninstall
it manually, remove the DLL from the AppInit_DLLs key and restart your 
machine. You can then safely delete
the DLL.

This tool requires administrative privileges on the vulnerable machines in 
order to install the fix.

References
http://www.determina.com/security_center/default.asp
http://secunia.com/advisories/18680/
http://www.frsirt.com/english/advisories/2006/1050
http://www.microsoft.com/technet/security/advisory/917077.mspx
CVE-2006-1359
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-1359

About Determina
DeterminaT represents the next generation of intrusion prevention software 
that goes beyond mere
detection and current "best-effort" prevention to fully eliminate the threat 
of the most critical
software attacks. Based on years of research at M.I.T., Determina utilizes 
unique patent-pending
Memory FirewallT technology which blocks attacks at the most fundamental 
level, by dynamically
building a protective shield around programs while they run in computer 
memory. This groundbreaking
approach has proven to be 100% effective against all memory-based attacks - 
such as Code Red, Blaster,
Slammer and Sasser - without false positives or ongoing overhead

Disclaimer
The information within this paper may change without notice. Use of this 
information constitutes
acceptance for use in an AS IS condition. There are NO warranties, implied 
or otherwise, with regard
to this information or its use. Any use of this information is at the user's 
risk. In no event shall
the author/distributor (Determina) be held liable for any damages whatsoever 
arising out of or in
connection with the use or spread of this information.





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ