what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

xpFireConvince.txt

xpFireConvince.txt
Posted Apr 1, 2006
Authored by Eduardo Braun Prado

By naming a file without a name, the Windows XP firewall may inadvertently trick a user into allowing a malicious application to run.

tags | advisory
systems | windows
SHA-256 | cad8f6954428ca2eddfad293271e4550156b0d16a95b58c6520d7938abb972b8

xpFireConvince.txt

Change Mirror Download
Windows XP firewall had improvements after SP2 and it display alerts about programs trying to listen on a port (acting as a 'server') to the users. It doesnt display the path for the file nor the last extension, instead, it only displays its description or name without the final extension. 

if u place a trojan with 'no name' in some dir, windows firewall will mistakenly alert about a 'folder name\', this can be misused to trick people into giving access to a malicious application thinking it is a legitim one. example below will make people think Internet Explorer is asking for access, when actually,it is not! :

==============example============================
in a cmd prompt:
copy mytrojan.exe "\program files\Internet Explorer\.exe"
cd \program files\internet explorer
start .exe
=================================================
An alert will show up saying 'Internet Explorer\' has been blocked and will ask if you want unblock it when it should alert about '.exe'.This could trick most people into thinking the firewall alerted about a well known legitim application.

another issue with the firewall is using NTFS alternate data streams. if u execute a file that is 'forked' to another one, no alerts will show up, not at all, but I dont think this is a security issue since on the computers I tested I wasnt able to direct connect.
example:

===============================================
in a cmd prompt:
type c:\mytrojan c:\windows\notepad.exe:mytrojan.exe
start c:\windows\notepad.exe:mytrojan.exe
===============================================
no alerts ;)

ps: every exploit code or details about a vulnerability here in Securityfocus are not found.
when you click in the exploit menu of any vulnerability and there is some kind of exploit code attached it will return an error such as 'the document you are looking for cannot be found' ... just like a broken link. and this issue is happening for some weeks. is this an error ?... waiting feedback on this issue.
cheers,
Edu









Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close