exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft CryptoAPI / Outlook 2007-2013 Design Bug

Microsoft CryptoAPI / Outlook 2007-2013 Design Bug
Posted Nov 12, 2013
Authored by Alexander Klink

A design bug in X.509 certificate chain validation (RFC 3280) allows attackers to trigger (blind) HTTP requests for both external as well as internal IPs if a specially-crafted, S/MIME-signed email is opened in Microsoft Outlook. This issue, which has been originally reported in 2008, has been revisited and timing differences make it possible to identify open and closed ports on internal networks.

tags | advisory, web
advisories | CVE-2013-3870
SHA-256 | 9365e6ebb217675995930a39307adaa0068c69e67328ec203f67fb4ba9ac8f00

Microsoft CryptoAPI / Outlook 2007-2013 Design Bug

Change Mirror Download
n.runs professionals GmbH
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2013.006 12-Nov-2013
________________________________________________________________________
Vendor: Microsoft, http://www.microsoft.com
Product: CryptoAPI/Outlook 2007-2013
Vulnerability: design bug
Tracking IDs: CVE-2013-3905, MSRC 14508, MS13-094
___________________________________________________________________________
Vendor communication:
2008-01-11: Originally reported to MSRC
2008-04-01: Original advisory release (CVE-2008-3068)
2012-05-08: Update (portscanning, WriteAV) reported to
MSRC via email
2012-05-15: MS acknowledges the receipt and opens a case
2012/2013: various status updates
2013-09-10: Patch released for the WriteAV bug
(CVE-2013-3870, MS13-068)
2013-11-12: Patch released for the design bug (MS13-094)
___________________________________________________________________________
Overview:

A design bug in X.509 certificate chain validation (RFC 3280)
allows attackers to trigger (blind) HTTP requests for both
external as well as internal IPs if a specially-crafted,
S/MIME-signed email is opened in Microsoft Outlook.

This issue, which has been originally reported in 2008 has been
revisited and timing differences make it possible to identify
open and closed ports on internal networks.

Descriptions:

The authority information access id-ad-caIssuers extension can
be used to trigger arbitrary HTTP requests. When triggering
alternated requests to internal and external hosts, timing
differences can be observed and thus it can be determined by
attackers whether ports on internal hosts are open or closed.

For a more detailed description, see our blog post at
http://blog.nruns.com/blog/2013/11/12/A-portscan-by-email-Alex

A proof-of-concept autoresponder replies to empty emails to
smime-http-portscan@klink.name with an email which scans the
50 most widely used ports on localhost and contains a link
to the result.

An additional WriteAV bug was identified when a large number of
nested S/MIME messages where being parsed in Outlook
(CVE-2013-3870, MS13-094).

Impact:

Information disclosure about open/closed ports in internal
networks.

Fixes:

This has been fixed in the November 2013 patch day (MS13-094).

Workarounds:

Block CryptoAPI user agents on an outgoing proxy.
________________________________________________________________________
Credits:
Alexander Klink, n.runs professionals GmbH
________________________________________________________________________
References:
This advisory and upcoming advisories:
http://www.nruns.com/security_advisory.php
________________________________________________________________________
About n.runs:
n.runs professionals GmbH is a vendor-independent consulting company
specialising in the areas of: IT Infrastructure, IT Security and IT Business
Consulting.

Copyright Notice:
Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an “as is” condition. All warranties are excluded.
In no event shall n.runs be liable for any damages whatsoever including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if n.runs has been advised of the possibility of such
damages.
Copyright 2013 n.runs professionals GmbH. All rights reserved. Terms of use
apply.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close