exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

fireclicking.txt

fireclicking.txt
Posted Jan 26, 2006
Authored by Michael Krax | Site mikx.de

Using custom Microsoft Agent characters it is possible to cover any kind of windows, including security or download dialogs. This is an expected feature of the Microsoft Agent control. Because custom characters are fully scriptable, can have any kind of shape and are downloaded automatically, this can be used as a flexible tool to cover and/or spoof any kind of window and lure the user to execute arbitrary code by performing one or two clicks (depending on security zone configuration and Windows version).

tags | advisory, arbitrary, spoof
systems | windows
SHA-256 | 039b06b0507512df1ffd004234a3787a21cf7ec3fdaad643a094cb8696e17771

fireclicking.txt

Change Mirror Download
It's now almost 18 months ago that i posted my first security advisory "What 
A Drag! -revisited-", seems to be a good time to post "What A Click!".

Both bugs had about the same exploit potential, but i assume this one will
have far less impact and media response (which i consider a great thing for
various reasons). Thanks to everybody who researched, worked, chatted,
discussed and got drunk with me in the last months to make this change
happen - you know who you are.

__Summary

Using custom Microsoft Agent characters it is possible to cover any kind of
windows, including security or download dialogs. This is an expected feature
of the Microsoft Agent control. To quote the product homepage: "Animations
are drawn on top of any underlying application window, characters are not
bounded within their own, separate window"
(http://www.microsoft.com/msagent/prodinfo/datasheet.asp). Custom characters
can be created with tools downloadable from that homepage.

Because custom characters are fully scriptable, can have any kind of shape
and are downloaded automaticly, this can be used as a flexible tool to cover
and/or spoof any kind of window and lure the user to execute arbitrary code
by performing one or two clicks (depening on security zone configuration and
Windows version).

__Proof-of-Concept

http://www.mikx.de/fireclicking/

The PoC is designed for Internet Explorer 6 on Windows XP SP2 in Windows
classic theme. By clicking on the button in the upper left corner you start
the download of a hta file. The download dialog gets covered by a Microsoft
Agent character which fakes a button (basicly a large white image with a
button border in the middle). Move the character by dragging to see how it
uses a "transparent spot" to make room for clicking on the underlying dialog
through the button space. Transparent areas in characters are really "not
there", meaning you can click through them.

When you click that button you execute arbitraty code in the hta file, in
this case you create the folder "c:\booom!". The button in the upper left
corner is only need to get around the "drive by download" protection of
Windows. When this protection is not in place (e.g. on Windows 2000) this
PoC could be reduced to a single click interaction to execute arbitrary
code.

__Status

The bug got fixed as part of the Microsoft Security Bulletin MS05-032 (yeah,
last summer).

The patch adds an additional security dialog before loading a custom agent
character. Be aware that in trusted zones that dialog might not raise.

2004-10-04 Vendor informed
2004-10-06 Vendor opened case, could not repro
2004-10-06 Vendor got new testcase
2004-10-12 Vendor confirmed bug
2005-06-14 Vendor relased patch and advisory
2006-01-22 Public disclosure

__Affected Software

Internet Explorer on Windows 98, 98 SE, ME, XP, 2000, Server 2003 with
different severity. See Microsoft Security Bulletin MS05-032 for details.

__Contact

Michael Krax <mikx@mikx.de>
http://www.mikx.de/

mikx


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close