what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

artikel53297.txt

artikel53297.txt
Posted Nov 20, 2004
Authored by Juergen Schmidt | Site heise.de

Flaws in SP2 security features, part II - With Service Pack 2, Microsoft introduced a couple of new security features. However, some of them suffer from implementation flaws.

tags | advisory
SHA-256 | 28a5ff6c2253f4f3033f8366da87986794ec4f93e78315699a8e20aa3c132977

artikel53297.txt

Change Mirror Download
Date: 16.11.2005
Author: Juergen Schmidt, heise Security
Original article: http://www.heise.de/security/artikel/53297
German version: http://www.heise.de/security/news/meldung/53306

Flaws in SP2 security features, part II

With Service Pack 2 Microsoft introduced a couple of new security
features. However, some of them suffer from implementation flaws.

One of the new security features is the restricted access to raw sockets
in SP2. By restricting the ability to send handcrafted packets, Microsoft
wants to "limit the ability of malicious code to create distributed
denial-of-service attacks and limit the ability to send spoofed packets"
(see
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2netwk.mspx#EHAA).

On the downside, a lot of tools, we use for our daily work, do not work
with those restrictions -- or have to use strange workarounds. A lot of
the features of the well known port scanner nmap did not work under
Windows XP SP2 -- until Fyodor came up with writing raw ethernet frames
instead of IP packets (which btw does not help on other transport mediums).

The implementation of those restrictions on raw sockets contains at least
one bug which makes them close to useless. They are coupled in some
mysterious way to the firewall service. Issuing the command

net stop SharedAccess

stops the firewall and opens the access to raw sockets. You can test this
easily by trying half open syn scans:

nmap -sS [somehost]

or spoofing IP adresses of UDP packets like in

nmap -sU -S 1.2.3.4 -e eth0 [somehost]

Neither command works with Windows XP SP2 and firewall enabled, but after
you turn it off, they do.

Microsoft has been informed about the problem and promised:

"Even though we do not consider this a security vulnerability, Microsoft
is committed to fixing this bug as quickly as is possible."

The issue was brought to my attention by Holger Lembke who found it during
his work on "3d traceroute" (http://www.d3tr.com).

bye, ju

--
Juergen Schmidt heise Security www.heisec.de
Heise Zeitschriften Verlag, Helstorferstr. 7, D-30625 Hannover
GPG-Key: 0x38EA4970, 5D7B 476D 84D5 94FF E7C5 67BE F895 0A18 38EA 4970

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close