what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

vuln-rnd.txt

vuln-rnd.txt
Posted Jun 27, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Malicious Flash files with explicit java scripts can be embedded within Excel spreadsheets using a "Shockwave Flash Object" which can be made to run once the file is opened by the user.

tags | advisory, java
SHA-256 | 5a7270e94904c8f983d1492db68f75bb9c93b353ea280930959f3a68958cfd1f

vuln-rnd.txt

Change Mirror Download
http://hackingspirits.com/vuln-rnd/vuln-rnd.html

CVE ID - CVE-2006-3014
MSRC ID - 6542sd

I. DESCRIPTION
Malicious Flash files with explicit java scripts can be embedded within
excel spreadsheets using a "Shockwave Flash Object" which can be made to run
once the file is opened by the user. It doesn't require user's intervention
to activate the object rather it runs automatically once the file is opened.


An attacker can use excel as a container to spread malicious flash files
which will execute once the excel file is opened by the user. For more
details refer the PoC below.

Note: The same flash file does not directly run when it is *inserted* into
the excel file as *objects*. However if it is embedded using "Shockwave
Flash Object", it plays *on load* of the excel file. Here there is no user
intervention required to trigger the flash file. It automatically plays once
the excel file is opened.


II. TESTING ENVIRONMENT
This test has been performed on -
Windows 2003 (SP1)
Windows XP Professional Edition (SP1 / SP2) + Office 2003
Windows 2000 Professional + Office 2003


III. PROOF-OF-CONCEPT
PoC details along with sample exploit file can be downloaded from -
http://hackingspirits.com/vuln-rnd/vuln-rnd.html


Note: Sample-xls-embed-flash.xls has been included as a demo exploit with
some safe javascripts.


IV. SOLUTION (PROVIDED BY MICROSOFT)
Just like IE - Microsoft Office enforces ActiveX control kill bits for SFI
controls. In fact the same OS kill bit infrastructure used by IE is also
used in Office. To learn more about kill bits please see
http://support.microsoft.com/kb/240797/EN-US/.

Office XP, 2003 honor kill bits - that is if an attacker tries to
instantiate a malicious control that has already had a kill bit issued then
they will be unsuccessful. Customer may also create their own kill bits by
reviewing the KB article listed above.

We are considering making changes in upcoming version and SP's to better
flag warn or control embedded controls.


V. DISCLOSURE TIMELINES
03 / 05 / 2006 - Vendor reported
05 / 05 / 2006 - Vendor requested for more info
09 / 05 / 2006 - More details with a working exploit provided to
vendor
11 / 05 / 2006 - Vendor confirmed the issue and requested for more
time to investigate
18 / 05 / 2006 - Vendor came up with the temporary workaround
23 / 05 / 2006 - Vendor requested to get the advisory past through
MSRC before public release
27 / 05 / 2006 - Vendor suggested minor changes in the advisory
27 / 05 / 2006 - Vendor requested to hold the advisory till 20th June
20 / 06 / 2006 - Vendor approved the release of advisory
20 / 06 / 2006 - Public disclosure


For more details visit - http://hackingspirits.com/vuln-rnd/vuln-rnd.html


VI. CREDITS
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close