what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-017

ms01-017
Posted Apr 10, 2001

Microsoft Security Advisory MS01-017 - Verisign created 2 digital certificates for someone who fraudulently claimed to be a Microsoft employee. The common name assigned to both certificates is "Microsoft Corporation". The ability to sign executable content using keys that purport to belong to Microsoft would clearly be advantageous to an attacker who wished to convince users to allow the content to run. Microsoft FAQ on this issue available here.

SHA-256 | ee77d083c9d8d2b90c75fe703247f46d4ebe0499c86e2b3a70910836516304c9

ms01-017

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ---------------------------------------------------------------------
- -
Title: Erroneous VeriSign-Issued Digital Certificates Pose
Spoofing Hazard
Released: 22 March 2001
Revised: 28 March 2001 (version 2.0)
Software: All Microsoft operating systems
Impact: Attacker could digitally sign code using the name
"Microsoft Corporation".
Bulletin: MS01-017

Microsoft encourages customers to review the Security Bulletin
at: http://www.microsoft.com/technet/security/bulletin/MS01-017.asp.
- ---------------------------------------------------------------------
- -

Reason for Revision:
====================
The software update discussed in the original version of the bulletin
is now available.

Issue:
======
In mid-March 2001, VeriSign, Inc., advised Microsoft that on January
29 and 30, 2001, it issued two VeriSign Class 3 code-signing digital
certificates to an individual who fraudulently claimed to be a
Microsoft employee. The common name assigned to both certificates is
"Microsoft Corporation". The ability to sign executable content using
keys that purport to belong to Microsoft would clearly be
advantageous to an attacker who wished to convince users to allow the
content to run.

The certificates could be used to sign programs, ActiveX controls,
Office macros, and other executable content. Of these, signed ActiveX
controls and Office macros would pose the greatest risk, because the
attack scenarios involving them would be the most straightforward.
Both ActiveX controls and Word documents can be delivered via either
web pages or HTML mails. ActiveX controls can be automatically
invoked via script, and Word documents can be automatically opened
via script unless the user has applied the Office Document Open
Confirmation Tool.

Even though the certificates say they are owned by Microsoft, they
are not bona fide Microsoft certificates, and content signed by them
would not be trusted by default. Trust is defined on a certificate-
by-certificate basis, rather than on the basis of the common name. As
a result, a warning dialogue would be displayed before any of the
signed content could be executed, even if the user had previously
agreed to trust other certificates with the common name "Microsoft
Corporation". The danger, of course, is that even a security-
conscious user might agree to let the content execute, and might
agree to always trust the bogus certificates.

VeriSign has revoked the certificates, and they are listed in
VeriSign's current Certificate Revocation List (CRL). However,
because VeriSign's code-signing certificates do not specify a CRL
Distribution Point (CDP), it is not possible for any browser's CRL-
checking mechanism to locate and use the VeriSign CRL. Microsoft has
developed an update that rectifies this problem. The update package
includes a CRL containing the two certificates, and an installable
revocation handler that consults the CRL on the local machine, rather
than attempting to use the CDP mechanism.

Customers should take notice of the caveats listed below in the
section titled "Additional information about this patch", and in
particular should note that the update will need to be re-installed
when upgrading to any currently-available version of Windows or
Internet Explorer. Versions of Windows beginning with Windows XP Gold
and Windows 2000 Service Pack 2, and versions of Internet Explorer
beginning with IE 6 will not require the update to be re-installed.

Customers who do not wish to install the update should take the
following steps to protect themselves in the event that they
encounter hostile code signed by one of the certificates:
- Visually inspect the certificates cited in all warning
dialogues. The two certificates at issue here were issued on
29 and 30 January 2001, respectively. No bona fide Microsoft
certificates were issued on these dates. The FAQ and Knowledge
Base article Q293817 provide complete details regarding both
certificates.
- Install the Outlook Email Security Update
(http://www.officeupdate.com/2000/downloadDetails/Out2ksec.htm)
to prevent mail-borne programs from being launched, even via
signed components, and install the Office Document Open
Confirmation Tool
(http://officeupdate.microsoft.com/downloadDetails/confirm.htm)
to force web pages to request permission before opening Office
documents.

Mitigating Factors:
====================
- The certificates are not trusted by default. As a result,
neither programs nor ActiveX controls could be made to run
without displaying a warning dialogue. By viewing the
certificate in such dialogues, users can easily recognize
the certificates.
- The certificates are not the bona fide Microsoft code-signing
certificates. Content signed by those keys can be distinguished
from bona fide Microsoft content.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-017.asp
for information on obtaining this patch.

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOsKSq40ZSRQxA/UrAQH1Fgf/cCCX2BadVfwic8mFKOVZy2vMTa+dKxLa
aSxO4qUuhZHMj0/uhbSzEZEtlvnnzFisDVhxrrVmUBOR1DbSbX3qHC3SOmCwEjbN
Gi1vei7HgCTEKSStTyElCarbGDudVRLQsP7CC0O7dCOQ6gApaRrXqYcLqhJVfwIM
O7+yubtDtv+InM7u/eex3gRqHHJJE2jCi+wEAAGqHBT/esvLYkxTM4+4x7mScsHn
P+VTACmj0Qc3NK3DwvIVOohpR1k6qIPJijvmoFnAti7yWuld4McUI4IBxHb8NFo1
E7bX7JXyZBrY5sx//o67pFjegISJlY6bD3iMZN0K+MGz/9sTIqjFLA==
=765Q
-----END PGP SIGNATURE-----

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close