ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [EEYEB-20080824] Internet Explorer Compressed Content URL Heap Overflow Vulnerability #2



> -----Original Message-----
> From: eEye Advisories [mailto:Advisories@xxxxxxxx] 
> Sent: Wednesday, September 13, 2006 2:31 AM
> To: bugtraq@xxxxxxxxxxxxxxxxx; 
> full-disclosure@xxxxxxxxxxxxxxxxx; ntbugtraq@xxxxxxxxxxxxx; 
> vulnwatch@xxxxxxxxxxxxx
> Subject: [EEYEB-20080824] Internet Explorer Compressed 
> Content URL Heap Overflow Vulnerability #2
> 
> Internet Explorer Compressed Content URL Heap Overflow 
> Vulnerability #2
> http://research.eeye.com/html/advisories/published/AD20060912.html
> 
> Release Date:
> September 12, 2006
> 
> Date Reported:
> August 24, 2006
> 
> Severity:
> High (Code Execution)
> 
> Systems Affected:
> Internet Explorer 5 SP4 with MS06-042 - Windows 2000
> Internet Explorer 6 SP1 with MS06-042 v1 or v2 - Windows 2000
> Internet Explorer 6 SP1 with MS06-042 v1 or v2 - Windows XP SP1
> Internet Explorer 6 SP1 with MS06-042 v1 or v2 - Windows 
> Server 2003 SP0
> 
> Overview:
> eEye Digital Security has discovered a second heap overflow 
> vulnerability in the MS06-042 cumulative Internet Explorer 
> update that would allow an attacker to execute arbitrary code 
> on the system of a victim who attempts to access a malicious 
> URL.š Windows 2000, Windows XP SP1, and Windows 2003 SP0 
> systems running Internet Explorer 5 SP4 or Internet Explorer 
> 6 SP1, with the MS06-042 patch applied, are vulnerable; 
> unpatched and more recent versions of Internet Explorer are 
> not affected.
> 
> This heap overflow is almost identical to the previous 
> vulnerability reported by eEye and addressed in the August 
> 24th re-release ("v2") of MS06-042.š In this case, the heap 
> overflow occurs when URLMON.DLL attempts to handle a long URL 
> for which the web server's response indicated GZIP or deflate 
> encoding, if that URL was returned as the destination of an 
> HTTP redirect (e.g., "302 Found").š This means that the user 
> interaction requirement for this attack is negligible, since 
> clicking a hyperlink, visiting a malicious web page, or even 
> attempting to view an image for which the source is a 
> malicious URL, permits exploitation of the vulnerability.š 
> 
> Technical Details:
> URLMON.DLL versions 5.0.3841.2400, 6.0.2800.1565, and 
> 6.0.2800.1567, distributed with the MS06-042 patches for 
> Internet Explorer 5 SP4 and Internet Explorer 6 SP1 on 
> Windows 2000, Windows XP SP1, and Windows 2003 SP0, contain a 
> heap buffer overflow vulnerability due to an incongruous use 
> of lstrcpynA.š CMimeFt::Create allocates a 390h-byte heap 
> block for a new instance of the CMimeFt class, within which 
> there is a 104h (MAX_PATH)-byte ASCII string buffer at offset +160h:
> 
> ššš 1A4267F8ššš pushššš 390hššššššššššš ; cb
> ššš 1A4267FDššš callššš ??2@YAPAXI@Zššš ; operator new(uint)
> 
> When an access to a URL elicits an HTTP redirect (statuses 
> 300 through 303) from the web server, and the subsequent 
> access to the "Location" URL returns a GZIP- or 
> deflate-encoded response, CMimeFt::ReportProgress will 
> attempt to copy the URL into the 104h-byte string buffer 
> using the lstrcpynA API function, but it passes a maximum 
> length argument of 824h (2084 decimal), a value typically 
> used as the maximum length of a URL:
> 
> ššš 1A425D41ššš pushššš 824hššššššššššš ; iMaxLength
> ššš 1A425D46ššš pushššš eaxšššššššššššš ; lpString2
> ššš 1A425D47ššš addšššš esi, 15Ch
> ššš 1A425D4Cššš pushššš esišššššššššššš ; lpString1
> ššš 1A425D4Dššš callššš ds:lstrcpynA
> 
> As a result, fields within the CMimeFt class instance, as 
> well as the contents of adjacent heap blocks, can be 
> overwritten with attacker-supplied data from the malicious URL.
> 
> Windows XP SP2 and Windows 2003 SP1 are not susceptible 
> because the URLMON.DLLs included in the MS06-042 patches for 
> those systems use 824h both as the field size and as the copy 
> length limit, in all the relevant locations in the code.š The 
> QFE branches of MS06-042 even for the above-mentioned 
> vulnerable versions of Windows and Internet Explorer are not 
> susceptible for the same reason; it is unclear why this fix 
> was repeatedly re-implemented, in many cases incorrectly, 
> when proper implementations have existed since August 8th.
> 
> Protection:
> Retina Network Security Scanner has been updated to identify 
> this vulnerability.
> 
> Vendor Status:
> Microsoft has released a third version of the MS06-042 patch 
> to correct this vulnerability. The revised patch is available at:
> http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx.
> 
> Note that installing the original release or first re-release 
> of the MS06-042 update causes a system to become vulnerable, 
> so applying the version 3.0 release of the MS06-042 patch 
> will then be necessary in order to secure that system.
> 
> Systems with the QFE version of the MS06-042 v1 or MS06-042 
> v2 / KB923762 hotfix applied are not susceptible to this 
> vulnerability, although the MS06-042 v3.0 patch should still 
> be installed on these systems.š (Note that the QFE DLL is 
> only selected in specific, rare circumstances, so most likely 
> applying MS06-042 v1 or v2 will deploy the vulnerable 
> GDR-branch DLL instead.)
> 
> Credit:
> Derek Soeder
> 
> Related Links:
> Retina Network Security Scanner - 
> (http://www.eeye.com/html/products/retina/index.html)
> Blink Endpoint Vulnerability Prevention - 
> (http://www.eeye.com/html/products/blink/index.html)
> 
> Greetings:
> Eric B. for discovering and contributing the 
> premier.microsoft.com proof-of-concept URL.š 3x charm.
> 
> Copyright (c) 1998-2006 eEye Digital Security
> Permission is hereby granted for the redistribution of this 
> alert electronically.š It is not to be edited in any way 
> without express consent of eEye.š If you wish to reprint the 
> whole or any part of this alert in any other medium excluding 
> electronic medium, please email alert@xxxxxxxx for permission.
> 
> Disclaimer
> The information within this paper may change without notice.š 
> Use of this information constitutes acceptance for use in an 
> AS IS condition.š There are no warranties, implied or 
> express, with regard to this information.š In no event shall 
> the author be liable for any direct or indirect damages 
> whatsoever arising out of or in connection with the use or 
> spread of this information.š Any use of this information is 
> at the user's own risk.
> 



 




Copyright © Lexa Software, 1996-2009.