[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.21.0611081035550.22551-100000@linuxbox.org>
Date: Wed, 8 Nov 2006 10:38:12 -0600 (CST)
From: Gadi Evron <ge@...uxbox.org>
To: full-disclosure@...ts.grok.org.uk
Cc: code-crunchers@...testar.linuxbox.org
Subject: Re: [Code-Crunchers] windows vulnerability? [was:
Re: 137 bytes]
On Wed, 8 Nov 2006, Gadi Evron wrote:
> On Wed, 8 Nov 2006, Thomas Pollet wrote:
> > Windows handles UNC paths the same way as local paths. Another mechanism
> > used to load a remote dll using a UNC path is described in
> > http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/win-usa-04/bh-win-04-litchfield/bh-win-04-litchfield.pdf
> > here the "system" directory is overwritten with a (unc) directory owned by
> > by the attacker. When GetSystemDirectoryW() is called to load the
> > faultrep.dll on exception, an attacker can supply his backdoored
> > faultrep.dll. I don't think you should classify this as a vulnerability,
> > it's known windows behaviour (yet, windows, a vulnerability all by itself?).
>
> Two issues:
> 1. The loading of the library...
> I've just had a very long discussion with someone who understands this far
> better than me. I am wrong (on that part), it's not a "vulnerability" but
> it's damn close, and can be used to fascilitate quite a bit. I see it as
> an issue, most people don't.
>
> It is a bummer for desktop firewalls though, no? :)
>
> http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/win-usa-04/bh-win-04-litchfield/bh-win-04-litchfield.pdf
>
> ^^ indeed
>
> 2. Issue that got to mind, making a leap from the first one...
>
> The point I was trying to make is very different, and speaks of what can
> potentially be done with this if this was code execution. Using the PE as
> a vector to attack the PE loader with (potential!) code execution for
> privilage esclation. Using the PE itself as a vector of attack.
>
> Much like you would use a doc file to exploit something in Word.. only
> not. :)
Okay, strike that. According to a friend who checked, it runs in usermode,
except for some core issues. Then it's kernel, and you need to be admin to
do it. Which is also pointless and it's hacking to be in ring0 when you
already are there.
Another friends says it will look pretty. :)
Gadi.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists