lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA9E730B.1760E%geoff.strickler@gmail.com>
Date: Tue, 20 Sep 2011 16:42:51 -0600
From: Geoff Strickler <geoff.strickler@...il.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Fix for NTFS permissions issue in QuickTime 7.x
	for Windows

In Dec 2010, Apple released QT 7.6.9. One of the included fixes was for
CVE-2010-0530 <http://support.apple.com/kb/HT4447>, which I had reported to
Apple. While 7.6.9 corrects the problem with new installations, it does not
revoke the inappropriate NTFS permissions that may have been granted by
previous installations of QT 7.6.8 or earlier. The problem goes back to at
least 7.5.5, possibly earlier versions.

Despite repeatedly pointing out to Apple that any fix needed to correct any
permissions on existing installations, they did not do so, and it appears
that they aren't going to. Therefore, I'm releasing the details of the
vulnerability, and a batch file to correct (on most machines) the
inappropriate NTFS permissions granted by earlier versions of QTWin.

Below is a batch file that, when run as an administrator, will remove the
inappropriate permissions from all accessible user profiles on a W2k, XP,
Vista, or Win7 machine. If you're running NT4, running Windows Server, or
have restricted access to any user profile directories, the following script
may need modification.

Network administrators who need support in correcting permissions on a large
network of machines may contact the author for PAID support and/or scripts
better suited to cleaning up permissions on a large number of computers.

This software is offered as is, without warranty, and with no free support.

Sincerely,
Geoff Strickler
On-line Transaction Consultants.

Below is the text of the
CVE-2010-0530-fix-perms-all-profiles-targeted.bat
batch file.

@echo off
  rem Version 1.00 - Sept 20, 2011 by Geoff Strickler.
  rem About the author: Geoff Strickler [geoff.strickler at
  rem  gmail.com] is the person who originally found and reported
  rem  the vulnerability now known as CVE-2010-0530.

rem ---- Purpose:
  rem This program fixes removes the inappropriate permissions that were
  rem  set by QuickTime for Windows versions prior to 7.6.9.
  rem Attempt to correct permissions in all user profiles on this machine.

rem ---- Background:
  rem Apple provided a fix for CVE-2010-0530 in QuickTime 7.6.9, however,
  rem  Apple's fix [http://support.apple.com/kb/HT4447] fails to correct
  rem  the permissions in systems where inappropriate permissions have
  rem  already been granted by previous versions of QuickTime.

  rem This fix is not needed on systems where where the volume containing
  rem  the user profile directories is a FAT-32 volume since those
  rem  don't support user ACLs.

rem ---- Legal disclaimers:
  rem This software provided free of charge, as-is, with no warranties
  rem  expressed or implied. You assume all liability for any damages,
  rem  including incidental or consequential damages. no free support is
  rem  available from the author as I've already spent far too much time
  rem  finding and reporting the problem, and in developing this fix for
  rem  what Apple didn't remedy.

  rem USE AT YOUR OWN RISK.

rem ---- Compatibility notes:
  rem This script is believed to be safe for use on W2k, XP, Vista, and Win7
  rem  systems. 

  rem The author has has only tested it on XP and Win7.

  rem It is NOT RECOMMENDED for Windows Servers

  rem It is NOT RECOMMENDED for NT4 systems, and might not be appropriate
  rem  for W2k or XP systems that are an in-place upgrade from NT4 or
  rem  earlier systems.

  rem For unsupported systems, either adapt it yourself, or contact the
  rem author for PAID support.

rem ---- Operation and usage notes:
  rem This script uses a "targeted" approach that will remove explicit (but
  rem  not inherited) permissions granted to specific subdirectories in all
  rem  user profile directories for which the user who executes it has
  rem  permissions to change permissions. Therefore, it's recommended that
  rem  this be executed by an administrator. It can be executed by non-
  rem  administrators, but in that case, it will typically only correct the
  rem  permissions in the current user's profile since that's the only
  rem  profile a non-administrator has access to change by default.

  rem The cacls command is deprecated in Vista and Win7, however, it still
  rem  works correctly. icacls is the replacement command, however, it's not
  rem  supported on XP and earlier system so cacls is used for maximum
  rem  compatibility.

rem ---- Start of script:
  rem Write a logfile to "CVE-2010-0530-log.txt" in the current user's
  rem  temporary directory.
echo %0 >%temp%\CVE-2010-0530-log.txt

  rem Make sure NT command extensions are enabled
setlocal EnableExtensions

  rem Since there is no environment variable that gives the base directory
  rem  containing all the user profiles, use the current user profile
  rem  directory (%userprofile%), then append "\..\*.*" to access it's
  rem  parent directory and get a list of all user profile directories.

  rem Iterate through all the user profile directories.
for /D %%i in ("%userprofile%\..\*.*") do (
   rem with NT4 and later, the command extensions allow some modification of
   rem environment variables. %%~i returns the same as %%i, but without the
   rem  leading and trailing quotes.
 echo . >>%temp%\CVE-2010-0530-log.txt
 echo %%~i >>%temp%\CVE-2010-0530-log.txt
 echo %%~i

   rem -------- revoke permissions for XP and earlier systems
   rem  from %userprofile%\Local Settings\Application Data\Apple Computer
   rem  and it's "QuickTime" subdirectory.
   rem
   rem  Notes on NT4 systems and possibly on W2k/XP systems that were
   rem  created as in-place upgrades from NT4 or earlier systems:
   rem 
   rem The author recommends using the "one-profile-shotgun" script on
   rem  each possibly affected user on such systems rather than modifying
   rem  this script for that purpose.
   rem
   rem Only remove permissions from the two directories known to be
   rem  affected. Revoke permissions from:
   rem  %%~i\Local Settings\Application Data\Apple Computer
 cacls "%%~i\Local Settings\Application Data\Apple Computer" /e /c /r
"everyone" >>%temp%\CVE-2010-0530-log.txt
   rem
   rem and %%~i\Local Settings\Application Data\Apple Computer\QuickTime
 cacls "%%~i\Local Settings\Application Data\Apple Computer\QuickTime" /e /c
/r "everyone" >>%temp%\CVE-2010-0530-log.txt
   rem
   rem -------- revoke permissions for Vista/Win7 systems
   rem from %userprofile%\AppData\LocalLow\Apple Computer
   rem  and it's "QuickTime" subdirectory.
   rem
   rem You may replace the below commands with the equivalent icacls
   rem  command, but it's not necessary.
   rem
   rem Only remove permissions from the two directories known to
   rem  be affected.
   rem  Revoke them from %%~i\AppData\LocalLow\Apple Computer
 cacls "%%~i\AppData\LocalLow\Apple Computer" /e /c /r "everyone"
>>%temp%\CVE-2010-0530-log.txt
   rem  and from %%~i\AppData\LocalLow\Apple Computer\QuickTime
 cacls "%%~i\AppData\LocalLow\Apple Computer\QuickTime" /e /c /r "everyone"
>>%temp%\CVE-2010-0530-log.txt

   rem --------
   rem If you have files or directories in this user profile that were
   rem  affected by the cacls commands above, and you want them to be
   rem  accessible by "everyone", add cacls command(s) below to allow
   rem  that access.
   rem [your cacls command(s) here]
   rem --------
)
endlocal
:end


Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ