lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <42D9BAEB.20205@immunitysec.com>
Date: Sun Jul 17 02:57:07 2005
From: dave at immunitysec.com (Dave Aitel)
Subject: Compromising pictures of Microsoft Internet
	Explorer!

They're going to use a different system - one that's not as vulnerable,
or has secondary methods of protection. Say, Linux, or a HIDS of some
sort. Any HIDS worth it's base price will protect against this sort of
thing. Or they'll invest in buying machines that support the NX bit and
install SP2. Not knowing about the bugs does not make you more secure.
Believe me, finding bugs is not the hardest thing in the world.

What Michal Zalewski did was tell people they were vulnerable, and how
vulnerable they were. They, including your clueless self, are now free
to make real descisions about their level of security. For this free
work, you, and the mindless drones like you, are giving him undeserved
shit because you bought some corporation's public relations line, to the
point of parroting their terminology. Those of us who actually are in
the hacking community think it is your small mind that is the
irresponsible disgrace.

-dave

tuytumadre@....net wrote:

> I do not meen to flame you, but you are an irresponsible disgrace to
> the hacking community. Do you not care about the customer? You never
> publicly disclose details to a vulnerability of this magnitude. This
> is an image vulnerability, for crying out loud. What's the first thing
> they tell you to do when most vulnerability details are released?
> Disable active scripting. That doesn't work here. What are the
> innocent, ignorant computer users going to do? Disable images? I think
> not. You should be ashamed.
>
>  
>
> I firmly believe that you are decieving us when you say you had a hard
> time with secure@...rosoft.com <mailto:secure@...rosoft.com>; in fact,
> I don't even think that you have ever once in your life reported a
> vulnerability to them responsibly. Otherwise, you would not have such
> harsh feelings about them. If the evil of the stereotypical Microsoft
> machine exists anywhere on the campus in Redmond, it will not be found
> in the building of MSRC, which is where your secure@...rosoft.com
> <mailto:secure@...rosoft.com> emails are directed.
>
>  
>
> Come on man. I know you have talent. You are a good researcher of
> computer security. But if your talent is going to be wasted like this,
> you are nothing more to us than a script kiddie.
>
>  
>
> Regards,
>
> Paul
>
> Greyhats Security
>
> http://greyhatsecurity.org
>
>  
>
>     -------------- Original message from Michal Zalewski
>     <lcamtuf@...ne.ids.pl>: --------------
>
>
>     > Synopsis:
>     > ---------
>     >
>     > Well, not really. Instead, at the risk of boring you to death,
>     I'd like
>     > to report on a casual 30-minute experiment I've conducted of
>     recent.
>     > This experiment resulted in identifying a potential remote code
>     > execution path in Microsoft Internet Explorer, plus some other
>     bugs, and
>     > should be a good starting point for further testing of other
>     browsers or
>     > similar programs.
>     >
>     > Discussion:
>     > -----------
>     >
>     > You might remember the 'mangleme' affair, where various browsers
>     were
>     > subjected by yours truly to a trivially constructed malformed HTML
>     > crash-course - all that in order to find exploitable input
>     handling flaws.
>     > Back then, MSIE pe rformed admirably compared to other browsers
>     (although
>     > did not escape some embarassment when ned@...inemenace found the
>     > infamous IFRAME bug that way):
>     >
>     > http://lcamtuf.coredump.cx/mangleme/gallery/
>     >
>     > Of recent, I decided to try something completely different and
>     radically
>     > new, without having to do any actual work. I used the same META
>     REFRESH
>     > auto-test framework to check for image decompression and parsing
>     flaws
>     > (JPEG, GIF, PNG), as opposed to making fun of HTML renderers.
>     >
>     > I used a simple index.cgi script (attached, though hardly
>     noteworthy) to
>     > dynamically generate a page that references ten just as dynamically
>     > created images. These images were prepared by running a test set of
>     > pictures (some regular ones, and several pathological cases
>     created with
>     > ImageMagick) through a slightly modified version of my old afx
>     utility.
>     >
>     > Surprisi ngly, it is MSIE and its proprietary JPEG decoder
>     (apparently
>     > not shared with other Windows components?) that performed
>     embarassingly
>     > poor this time. Results below.
>     >
>     > Vulnerability examples:
>     > -----------------------
>     >
>     > NOTE #1: As with mangleme, this list of problems is most
>     certainly NOT
>     > exhaustive, and performing longer tests or improving the technique
>     > would most likely result in additional findings.
>     >
>     > Several MSIE crash sample files from that 30-minute run are
>     available
>     > at:
>     >
>     > http://lcamtuf.coredump.cx/crash/
>     >
>     > Note that these may produce different results depending on program
>     > versions, plugins and configuration. Tested with WinXP Pro PL
>     > 2600.xpsp2.050301-1526 SP1, MSIE PL 6.0.2800.1106, up-to-date.
>     >
>     > mov_fencepost.jpg - on most platforms, causes a crash due to mov
>     > destination fencepost error after g oing past allocated memory, or
>     > after accessing a bogus address such as 0x27272727. The destination
>     > address appears to be controllable (i.e. changing the file or
>     > displaying other data before or along with this image alters it).
>     > My bets are that this is exploitable for remote execution.
>     >
>     > cmp_fencepost.jpg - here, causes a crash due to a very similar cmp
>     > fencepost (no write). Not necessarily exploitable for remote code
>     > execution, unless code execution path can be affected later on.
>     >
>     > oom_dos.jpg - usually causes a OOM crash. Less interesting, unless
>     > you like to punish people who borrow your pictures for their blogs.
>     >
>     > random.jpg - causes mov fencepost of CPU consumption + crash.
>     Didn't
>     > investigate in much detail.
>     >
>     > NOTE #2: MSIE comes with no sources, and reverse engineering is
>     naughty.
>     > I didn't examine the renderer to see what went w rong; I see
>     unbounded,
>     > user-dependent memory accesses, and that spells trouble.
>     >
>     > Vendor notification:
>     > --------------------
>     >
>     > It is my experience that reporting and discussing security
>     problems with
>     > Microsoft is a needlessly lengthy process that puts too much
>     burden and
>     > effort on the researcher's end, especially if you just have a crash
>     > case, not a working exploit; hence, they did not get an advance
>     notice.
>     >
>     > Bonus (OT)
>     > ----------
>     >
>     > Since piggyback request smuggling and fooling proxies and
>     filters is a
>     > popular new pastime, some of you might find it entertaining to
>     have a
>     > look at how various applications differ in handling duplicate
>     instances
>     > of HTTP/SMTP message/NNTP headers that are, in common perception,
>     > "supposed to" occur only once.
>     >
>     > --
>     > ------------------------- bash$ :(){ :|:&};: --
>     &g t; Michal Zalewski * [http://lcamtuf.coredump.cx]
>     > Did you know that clones never use mirrors?
>     > --------------------------- 2005-07-14 00:29 --
>     > http://lcamtuf.coredump.cx/silence/ 
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ