To: sandintoes who wrote (666237 ) 12/27/2004 1:37:29 PM From: DuckTapeSunroof Read Replies (1) | Respond to of 769670 Just a few of the most recent reported issues: (1) HIGH: Microsoft Windows HTML Help ActiveX Control Vulnerability Affected: Internet Explorer version 6.0 Windows XP SP2 Description: This vulnerability in the HTML Help ActiveX Control can be used to completely compromise a Windows client. An attacker can exploit the flaw by constructing a malicious webpage or an HTML email. Browsing the webpage or opening the email is sufficient for the client compromise i.e. no further user interaction is required. The problem occurs because it is possible to inject JavaScript code in the HTML Help ActiveX control's parameters. By forcing the control to open a local file, it is then possible to execute the JavaScript code in the context of the "Local Computer" zone. Technical details and a proof-of-concept exploit have been publicly posted. The PoC exploit, when run on Windows XP SP2, creates "Microsoft Office.hta" file in the "Documents and Settings\All Users\Start Menu\Programs\Startup" directory. Status: Microsoft not confirmed, no patches available. A workaround is to disable "Active Scripting" in Internet Explorer. Council Site Actions: Due to holidays and the late-breaking nature of the issues, we were unable to solicit any council site responses. References: Posting by Paulfreehost07.websamba.com PoC Exploit (Warning: Clicking the following link will launch the PoC Exploit)freehost07.websamba.com SecurityFocus BID Not yet available. *********************************************************************** (2) HIGH: Microsoft Windows USER32 Library LoadImage Buffer Overflow Affected: Windows NT/2000/XP SP0 and SP1/2003 Description: USER32 library contains Windows API functions for user interface handling. The "LoadImage" function is responsible for handling files such as icons, cursors, animated cursors and bitmaps. The "LoadImage" function reportedly contains a heap-based buffer overflow that can be triggered by a specially crafted icon, cursor or a bitmap file. The problem occurs because the declared image size is not checked prior to opening the image. The flaw may be able to be exploited to execute arbitrary code on the client. To exploit the flaw, an attacker can take any of the following actions: (a) Create a webpage containing a malicious .ico, .bmp, .ani or .cur file, and entice an attacker to visit his webpage. (b) Send an HTML email containing the malicious .ico, .bmp, .ani or .cur file. (c) Create a shared folder containing the malicious .ico, .bmp, .ani or .cur file, and entice a user to browse his shared folder. The technical details and exploit code have been publicly posted. Status: Microsoft not confirmed, no patches available. XP SP2 is reportedly not vulnerable. Council Site Actions: Due to holidays and the late-breaking nature of the issues, we were unable to solicit any council site responses. References: Posting by flashsky fangxingsecurityfocus.com Exploit Codexfocus.net LoadImage Function Referencemsdn.microsoft.com SecurityFocus BID Not yet available. *********************************************************************** (3) MODERATE: Microsoft Windows Winhlp32.exe Buffer Overflows Affected: Windows NT/2000/XP/2003 Description: Winhlp32.exe application is responsible for handling Windows Help (".hlp") files. This application reportedly contains a heap-based buffer overflow and integer overflow vulnerability. A specially crafted ".hlp" file may exploit these flaws to execute arbitrary code on the client system with the privileges of the logged-on user. Note that Windows prompts a user before downloading and opening a ".hlp" file. Hence, to exploit the flaw via a hyperlink or frame pointing to the malicious .hlp file will require user interaction. However, it may also be possible to invoke Winhlp32.exe via the HTML Help ActiveX Control, and exploit the flaw without any user interaction (not confirmed). The technical details and proof-of-concept exploits have been publicly posted. Status: Microsoft not confirmed, no patches available. Users should not open .hlp files downloaded from untrusted sources. Council Site Actions: Due to holidays and the late-breaking nature of the issues, we were unable to solicit any council site responses. References: Posting by flashsky fangxingsecurityfocus.com PoC Exploitsxfocus.net xfocus.net SecurityFocus BID Not yet available. ************************************************************************* (4) MODERATE: Internet Explorer DHTML Edit ActiveX Control Spoofing Affected: Internet Explorer version 6.0 and possibly prior Description: This Internet Explorer (IE) vulnerability allows an attacker to trick a victim into visiting a malicious site. The attack occurs when a victim clicks a link supplied by the attacker in an email or on a webpage, which according to IE's address bar points to a trusted site. However, the attacker can manipulate all the contents of the trusted site's webpage. Hence, any information entered by the user on such a page can be stolen by the attacker (phishing attacks). The problem occurs due to a flaw in IE's DHTML Edit ActiveX control. The control's "execScript" function does not sufficiently validate a window's domain prior to executing a script. The attacker can leverage the flaw in the execScript function to re-write the contents of a trusted site's webpage. Note that the attacker can also spoof the content for secure sites by exploiting this vulnerability as IE shows a "Lock" icon on the bottom right-hand corner on a spoofed webpage. Status: Microsoft not confirmed, no updates available. An option is to disable ActiveX controls. However, that may downgrade the users' web browsing experience. The users should be advised to type the web addresses of sensitive sites such as banks etc. and not to open links to secure sites embedded in another page or an email. Council Site Actions: All council sites are awaiting confirmation from the vendor and a patch. They plan to patch during the regular system update process. One site commented that they consider IE vulnerabilities a level 4 on a scale from 1 to 5 for servers and a level 5 on a workstation. Thus, this is not a priority to patch for them. Another site is still investigating replacing IE with Firefox as a long term strategy move. References: Posting by Paulfreehost07.websamba.com PoC Codefreehost07.websamba.com secunia.com DHTML ActiveX Controlmsdn.microsoft.com msdn.microsoft.com Secunia Advisorysecunia.com SecurityFocus BIDs Not available yet.