what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Insomnia Security Vulnerability Advisory 100216.1

Insomnia Security Vulnerability Advisory 100216.1
Posted Feb 16, 2010
Authored by Brett Moore | Site insomniasec.com

Insomnia Security Vulnerability Advisory - A flaw exists with the handling of malformed URL's passed through the ShellExeute() API in Microsoft Windows. The vulnerability does not directly cause an issue within Windows itself however, applications that call the flawed API may be vulnerable to various attacks, one of which is shown in this report.

tags | advisory
systems | windows
SHA-256 | 39f5ed63255f91f74bafeb10491b25db0ff238ff227c677e96fd690e0beceae1

Insomnia Security Vulnerability Advisory 100216.1

Change Mirror Download
__________________________________________________________________

Insomnia Security Vulnerability Advisory: ISVA-100216.1
___________________________________________________________________

Name: Windows URL Handling Vulnerability
Released: 16 February 2010

Vendor Link:
http://www.microsoft.com/

Affected Products:
Windows 2000, Windows XP, Windows 2003, Windows Vista

Original Advisory:
http://www.insomniasec.com/advisories/ISVA-100216.1.htm

Researcher:
Brett Moore, Insomnia Security
http://www.insomniasec.com
___________________________________________________________________

_______________

Description
_______________

A flaw exists with the handling of malformed URL's passed through
the ShellExeute() API. The vulnerability does not directly cause
an issue within Windows itself however, applications that call
the flawed API may be vulnerable to various attacks, one of which
is shown in this report.

_______________

Details
_______________

The vulnerability is reached when the malformed URL contains #:
and can be used to reference local files.

Two such examples are shown here;
acrobat://test/#://../../c:/windows/system32/calc.exe
or
anything://test/#://../../c:/windows/system32/calc.exe

The results will be different dependant on where the URL is used
and which OS platform is in use.

Some examples are shown here;

Start->Run
Calc.exe is executed without prompt

IE URL Bar or HREF
User is prompted to execute calc.exe

Word Document
User is prompted to open acrobat link

PDF Document
Calc.exe is executed without prompt

Firefox
Firefox will not follow the URL

Safari
Calc.exe is executed without prompt

___________________

Potential Exploit
___________________

Safari will not access the local file through the standard
file:// link, but will execute the local file through the malformed
link.

One method of executable delivery is through the onenote://
URL protocol if Microsoft OneNote is installed.

OneNote will automatically open and process a onenote file shared
over an SMB share. Any executables stored within the onenote file
will be cached locally. This is done by downloading the embedded
executables and storing them in a known location.

C:/Users/[USERNAME]/AppData/Local/Microsoft/OneNote/12.0/OneNoteOfflineCache
_Files/

This file can then be executed through the URL handling vulnerability
leading to an automatic code execution issue through Safari.

Obviously there are some requirements for this exploit;
+ the target user name must be known
+ Microsoft OneNote must be installed
+ SMB access out must be allowed

_______________

Solution
_______________

Microsoft have released a security update to address this issue;
http://www.microsoft.com/technet/security/Bulletin/MS10-002.mspx
http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

_______________

Legals
_______________

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.
___________________________________________________________________

Insomnia Security Vulnerability Advisory: ISVA-100216.1
___________________________________________________________________


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close