lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3006FE0AACFD1A49B2E305CFC8B822CC1411CECAFD@GILTMX07.corp.gilt.com>
Date: Mon, 11 Jul 2011 20:10:57 -0400
From: Aleksandr Yampolskiy <ayampolskiy@...t.com>
To: "'dan@...para.com'" <dan@...para.com>, "'mitja.kolsek@...ossecurity.com'"
	<mitja.kolsek@...ossecurity.com>
Cc: "'si-cert@...es.si'" <si-cert@...es.si>,
	"'full-disclosure@...ts.grok.org.uk'" <full-disclosure@...ts.grok.org.uk>,
	"'security@...ossecurity.com'" <security@...ossecurity.com>,
	"'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com>,
	"'cert@...t.org'" <cert@...t.org>
Subject: Re: Binary Planting Goes "Any File Type"

I am not sure about that argument. Most users nowadays know it's not safe to download Executables (according to polls in my company during security awareness training) but will gladly open html.

----- Original Message -----
From: Dan Kaminsky <dan@...para.com>
To: Mitja Kolsek <mitja.kolsek@...ossecurity.com>
Cc: security@...ossecurity.com <security@...ossecurity.com>; bugtraq@...urityfocus.com <bugtraq@...urityfocus.com>; full-disclosure@...ts.grok.org.uk <full-disclosure@...ts.grok.org.uk>; cert@...t.org <cert@...t.org>; si-cert@...es.si <si-cert@...es.si>
Sent: Fri Jul 08 19:26:17 2011
Subject: Re: [Full-disclosure] Binary Planting Goes "Any File Type"

It's a nice attempt, but no.  The social engineering required to pull
that off exceeds what's required to get somebody to download and
execute setup.exe, and we don't call that RCE either.

Hundreds of false bugs are blinding you to probably a dozen real bugs.
 Likely more.  In security as in finance, the bad drives out the good.


On Fri, Jul 8, 2011 at 4:11 PM, Mitja Kolsek
<mitja.kolsek@...ossecurity.com> wrote:
> Ok, Dan, just for you:
>
> Launch Internet Explorer 9 on Windows 7 (probably other IE/Win works too), go to File->Open (or press Ctrl+O), browse to Test.html and open it. No double-clicking and you couldn't launch an executable this way. Better?
>
> Cheers,
> Mitja
>
> On Jul 8, 2011, at 9:10 PM, Dan Kaminsky <dan@...para.com> wrote:
>
>> And here's where your exploit stops being one:
>>
>> ===
>> Suppose the current version of Apple Safari (5.0.5) is our default web
>> browser. If we put the above files in the same directory (on a local
>> drive or a remote share) and double-click Test.html, what happens is
>> the following:
>> ===
>>
>> At this point, Test.html might actually be test.exe with the HTML icon
>> embedded.  Everything else then is unnecessary obfuscation -- code
>> execution was already possible the start by design.
>>
>> This is a neat vector though, and it's likely that with a bit more
>> work it could be turned into an actual RCE.
>>
>> On Fri, Jul 8, 2011 at 10:38 AM, ACROS Security Lists <lists@...os.si> wrote:
>>>
>>> We published a blog post on a nice twist to binary planting which we call "File
>>> Planting." There'll be much more of this from us in the future, but here's the first
>>> sample for you to (hopefully) enjoy.
>>>
>>> http://blog.acrossecurity.com/2011/07/binary-planting-goes-any-file-type.html
>>>
>>> or
>>>
>>> http://bit.ly/nXmRFD
>>>
>>>
>>> Best regards,
>>>
>>> Mitja Kolsek
>>> CEO&CTO
>>>
>>> ACROS, d.o.o.
>>> Makedonska ulica 113
>>> SI - 2000 Maribor, Slovenia
>>> tel: +386 2 3000 280
>>> fax: +386 2 3000 282
>>> web: http://www.acrossecurity.com
>>> blg: http://blog.acrossecurity.com
>>>
>>> ACROS Security: Finding Your Digital Vulnerabilities Before Others Do
>>>
>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ