Last Updated: 2006-06-30 07:28:33 UTC
by Bojan Zdrnja (Version: 3)
A critically rated IE vulnerability in the use of HTA applications (CLSID 3050f4d8-98B5-11CF-BB82-00AA00BDCE0B) to trick a user into opening a file by double clicking it. The file has to be accessible through either SMB or, according to the advisory, WebDAV, and can be located on a remote site. The currently available version of PoC that was published is limited in that it requires the user to double click on an icon to execute a potentially malicious payload, but we can expect to find creative use of this exploit in the wild very soon. The workaround for this appears to be disabling active scripting.
The second vulnerability is related to the handling of the object.documentElement.outerHTML property. The abuse of this property will allow an attacker to retrieve remote content in the context of the web page which is being currently viewed by the user. This vulnerability can be potentially nasty as attackers can use it to retrieve data from other web sites user is logged into (for example, webmail) and harvest user credentials. Several handlers have spent a little more time validating this particular issue and while it is a subtle exploit and rated a lower level risk, this issue has raised some of our neck hairs.
Microsoft is investigating both issues and Secunia posted a PoC web page for the second vulnerability that you can find at http://secunia.com/internet_explorer_information_disclosure_vulnerability_test.
Regarding the second vulnerability, what's interesting is that we were able to reproduce this even when using Mozilla FireFox.
We have not received any reports of these vulnerabilities being actively exploited in the wild. Please let us know if you have more information and we'll update the diary accordingly.
** As another worthy 'Handler tools' mention that is applicable as a general protection tool which has been gaining increased use in the testing of malicious code and reviewing potentially malicious websites is the SandboxIE tool. Browse safely over to http://www.sandboxie.com.
We have been getting comments about the statement of Firefox being vulnerable. After repeated testing, one of the handlers has confirmed that it is definitely vulnerable. The code found at Secunia will not catch vulnerable versions of Firefox but the original PoC found on FullDisclosure will work on Firefox.
After doing more research on this vulnerability and with great help from our readers (thanks to Dan and another reader) it seems that Mozilla Firefox is not affected by this vulnerability.
The (obvious) reason for this is that Firefox doesn't support the outerHTML property at all (innerHTML property is supported). As this property is not supported, the original context can't get any data from the HTML that was loaded into the <object> tag.
If you test this with the original PoC posted on Full Disclosure, you can notice that Firefox will load the target web page into the object tag, but the alert call (which is in the original context) will not be able to get any data. If you use Internet Explorer 6 this is not the case as the original context script can access data that was loaded into the object tag.
The fact that Firefox displays the target web page has nothing to do with this vulnerability (apart from the fact that it can confuse the user, but that's another story); so in this context it's no different than using an iframe.
Internet Explorer 7 is also not affected by this vulnerability.
Last Updated: 2006-06-28 21:07:39 UTC
by Toby Kohlenberg (Version: 1)
Apple announced yesterday that a new version of OSX (10.4.7) is available and recommended for all users:http://www.apple.com/support
To quote the announcement:
It includes fixes for:
- preventing AFP deadlocks and dropped connections
- saving Adobe and Quark documents to AFP mounted volumes
- Bluetooth file transfers, pairing and connecting to a Bluetooth mouse, and syncing to mobile phones
- audio playback in QuickTime, iTunes, Final Cut Pro, and Soundtrack Pro applications
- ensuring icons are spaced correctly when viewed on desktop
- determining the space required to burn folders
- iChat audio and video connectivity, creating chat rooms when using AIM
- importing files into Keynote 3
- PDF workflows when using iCal and iPhoto
- reliable use of Automator actions within workflows
- importing and removing fonts in Font Book
- syncing addresses, bookmarks, calendar events and files to .Mac
- compatibility with third party applications and devices
- previous standalone security updates
SHA1: MacOSXUpd10.4.7Intel.dmg = 2a25ed61d586b71ba7282fb896b2c910785ff358
SHA1: MacOSXUpd10.4.7PPC.dmg= 223d1fc9197a6a96c9d2f2a9110d37abc219c3a6