Hi there,
Not sure how to post this without starting a flame war.
But (mainly for the "Windows is only vulnerable due to non-patched machines" crowd) I thought it was worth mentioning two recently announced vulnerabilities hot off the SANS newswire. They're the first not-already-patched exploits I've seen in several weeks, but it's not an uncommon problem.
Out of fairness I'll also point out the same issue listed the OS X "Help Protocol" exploit, which was patched last Friday.
#1 HIGH: Microsoft Outlook Arbitrary Code Execution
Affected: Outlook 2003
Description: The default security setting of Outlook 2003 ("Restricted Zone") does not allow execution of Active-X controls and arbitrary scripts. However, it is reported that an email containing an embedded OLE object such as a Windows media player, can bypass these security checks. By exploiting this flaw in conjunction with the Outlook's flaw of storing files specified in "img" tags at a predictable location, it may be possible to silently execute arbitrary code on the client system. The code would execute with the privileges of the logged-on user. A proof-of-concept exploit has been posted.
Status: Microsoft has not confirmed, no updates available.
References:
Postings by http-equiv
http://archives.neohapsis.com/archives/ntbugtraq/2004-q2/0058.html
http://archives.neohapsis.com/archives/ntbugtraq/2004-q2/0056.html
Proof-of-Concept Exploit
http://www.malware.com/rockIT.zip
OLE Concepts
http://support.microsoft.com/support/kb/articles/Q86/0/08.asp&NoWebContent=1
SecurityFocus BIDs
http://www.securityfocus.com/bid/10369
http://www.securityfocus.com/bid/10307
#2 MODERATE: Windows Folder Arbitrary Code Execution
Affected: Windows XP/2000
Description: The "desktop.ini", a hidden file when present in a Windows folder, instructs Windows Explorer how to display the folder's contents. A problem arises when the ".ShellClassInfo" section in a folder's desktop.ini file points to an executable program. This can be exploited to execute arbitrary code on a client system when an unsuspecting user opens such a specially crafted folder. To exploit the flaw, an attacker would have to create the malicious "shared" folder and entice a victim to open it. The attacker can include the folder's URI for e.g. \\attacker-ip\bad-folder, in a webpage or email it to a potential victim. Proof-of-Concept exploit that installs a keylogger on the client system has been publicly posted.
Status: Microsoft has not confirmed, no patches available. Block the ports 139/tcp and 445/tcp at the network perimeter to prevent attacks from the Internet.
References:
Posting by Roozbeh Afrasiabi
http://www.securityfocus.com/archive/1/363590/2004-05-17/2004-05-23/0
Proof-of-Concept Exploit
http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm
Desktop.ini File Details
http://msdn.microsoft.com/library/e...hell_basics/shell_basics_extending/custom.asp
SecurityFocus BID
http://www.securityfocus.com/bid/10363
Not sure how to post this without starting a flame war.
Out of fairness I'll also point out the same issue listed the OS X "Help Protocol" exploit, which was patched last Friday.
#1 HIGH: Microsoft Outlook Arbitrary Code Execution
Affected: Outlook 2003
Description: The default security setting of Outlook 2003 ("Restricted Zone") does not allow execution of Active-X controls and arbitrary scripts. However, it is reported that an email containing an embedded OLE object such as a Windows media player, can bypass these security checks. By exploiting this flaw in conjunction with the Outlook's flaw of storing files specified in "img" tags at a predictable location, it may be possible to silently execute arbitrary code on the client system. The code would execute with the privileges of the logged-on user. A proof-of-concept exploit has been posted.
Status: Microsoft has not confirmed, no updates available.
References:
Postings by http-equiv
http://archives.neohapsis.com/archives/ntbugtraq/2004-q2/0058.html
http://archives.neohapsis.com/archives/ntbugtraq/2004-q2/0056.html
Proof-of-Concept Exploit
http://www.malware.com/rockIT.zip
OLE Concepts
http://support.microsoft.com/support/kb/articles/Q86/0/08.asp&NoWebContent=1
SecurityFocus BIDs
http://www.securityfocus.com/bid/10369
http://www.securityfocus.com/bid/10307
#2 MODERATE: Windows Folder Arbitrary Code Execution
Affected: Windows XP/2000
Description: The "desktop.ini", a hidden file when present in a Windows folder, instructs Windows Explorer how to display the folder's contents. A problem arises when the ".ShellClassInfo" section in a folder's desktop.ini file points to an executable program. This can be exploited to execute arbitrary code on a client system when an unsuspecting user opens such a specially crafted folder. To exploit the flaw, an attacker would have to create the malicious "shared" folder and entice a victim to open it. The attacker can include the folder's URI for e.g. \\attacker-ip\bad-folder, in a webpage or email it to a potential victim. Proof-of-Concept exploit that installs a keylogger on the client system has been publicly posted.
Status: Microsoft has not confirmed, no patches available. Block the ports 139/tcp and 445/tcp at the network perimeter to prevent attacks from the Internet.
References:
Posting by Roozbeh Afrasiabi
http://www.securityfocus.com/archive/1/363590/2004-05-17/2004-05-23/0
Proof-of-Concept Exploit
http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm
Desktop.ini File Details
http://msdn.microsoft.com/library/e...hell_basics/shell_basics_extending/custom.asp
SecurityFocus BID
http://www.securityfocus.com/bid/10363