what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SECOBJADV-2008-03.txt

SECOBJADV-2008-03.txt
Posted Aug 14, 2008
Authored by Derek Callaway | Site security-objectives.com

Security Objectives Advisory - PartyGaming PartyPoker suffers from a malicious client-side update vulnerability that allows for code execution.

tags | advisory, code execution
advisories | CVE-2008-3324
SHA-256 | f57e02adc864b8746418ea86d43da9f4ef3b01c6e966c3aa50ee604cdb4c1c52

SECOBJADV-2008-03.txt

Change Mirror Download
======================================================================
= Security Objectives Advisory (SECOBJADV-2008-03) =
======================================================================

PartyGaming PartyPoker Malicious Update Vulnerability

http://www.security-objectives.com/advisories/SECOBJADV-2008-03.txt

AFFECTED: PartyPoker Client (Build Number 121/120, Build Date Mar 18 2008)
Other versions may also be affected

PLATFORM: Intel / Windows

CLASSIFICATION: Origin Validation Error (CWE-346)

RESEARCHER: Derek Callaway

IMPACT: Client-side code execution

SEVERITY: Medium

DIFFICULTY: Moderate

REFERENCES: CVE-2008-3324


BACKGROUND

PartyPoker.com (www.PartyPoker.com) is the world's largest online poker brand
in terms of number of players and revenues. You'll find a great variety of
poker games and tournaments, plus blackjack.

SUMMARY

The PartyGaming PartyPoker client program can be forced into downloading a
malicious update. This is a result of the PartyPoker client not properly
confirming the authenticity of the network update server or the
executable update files themselves. When downloading an update, first
the client program resolves the DNS address of the update host. Next, it
establishes a TCP connection on port 80 of the previously resolved IP
address. Then, it sends an HTTP request for an EXE file under the web
server's Downloads directory. Upon receiving the HTTP response, the
requested portable executable is written to disk and executed.

ANALYSIS

To successfully exploit this vulnerability an attacker must be able to
somehow position themself such that they can impersonate the update server.
This can be accomplished through DNS cache poisoning, ARP redirection,
TCP hijacking, impersonation of a Wi-Fi Access Point, etc. The attacker
also would have configured a rogue web server to push out update code of
their choosing.

Before PartyPoker downloads the update it communicates with another
PartyGaming server in the 88.81.154.0/24 subnetwork via SSL to determine
if a new client update is available; if so, a HTTP GET request is sent
to www1.partypoker.com for an EXE file in the /Downloads/en/vcc
directory and is stored on the local filesystem under
C:\Programs\PartyGaming\tmpUpgrade and executed. Afterwards, the user
may login and operate the PartyPoker client as usual.

Since the update itself is downloaded from a seperate server, the client
can contact the legitimate PartyGaming server during exploitation to
determine if an update is available as normal. The attacker only needs
to masquerade as www1.partypoker.com.

WORKAROUND

Do not use the PartyPoker client program.

VENDOR RESPONSE

The vendor was contacted initially and fully aware of the vulnerability.
However, after unsuccessfully attempting to reestablish dialogue multiple times
with limited responsiveness over a period of several months, Security
Objectives proceeded with the advisory.

DISCLOSURE TIMELINE

20-Feb-2008 Discovery of Vulnerability
22-Feb-2008 Developed Proof-of-Concept
25-Feb-2008 Reported to Vendor
15-Aug-2008 Published Advisory

ABOUT SECURITY OBJECTIVES

Security Objectives is a security centric consultancy and software development
corporation which operates in the area of application assurance software.
Security Objectives employs methods that are centered on software
comprehension, therefore a more in-depth contextual understanding of the
application is developed.

http://security-objectives.com/

LEGAL

Permission is granted for electronic distribution of this advisory.
It may not be edited without the written consent of Security Objectives.

The information contained in this advisory is believed to be accurate based on
currently available information and is provided "as is" without warranty of
any kind, either expressed or implied, including, but not limited to, the
implied warranties of merchantability and fitness for a particular purpose.
The entire risk as to the quality and performance of the information is with
you.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close