Bugtraq mailing list archives

Re: L0pht Advisory: IE4.0


From: leif () GCI NET (Leif Sawyer)
Date: Mon, 10 Nov 1997 14:02:33 -0900


This is a multi-part message in MIME format.

------=_NextPart_000_0009_01BCEDE1.4AA9AE70
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Running Windows NT 4.0/sp3 and I.E. 4.0 (4.71.1712.6) 128-bit =
extensions:

res://abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abc=
defghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijkl=
mnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstu=
vwxyz123456abcdefghijklmnopqrstuvwxyz123456abcd/

returns:
/-
 Internet Explorer cannot open the internet site ".."=20
  The specified module could not be found.
\-

but

res://abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abc=
defghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijkl=
mnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstu=
vwxyz123456abcdefghijklmnopqrstuvwxyz123456abcde/

and longer strings return:

/-
 Internet Explorer cannot open the internet site ".."=20
  The filename or extension is too long.
\-

looks like a win95 centric bug to me.  Note that I didn't try the =
exploit..:-)

-----Original Message-----
    From: DilDog <dildog () L0PHT COM>
    To: BUGTRAQ () NETSPACE ORG <BUGTRAQ () NETSPACE ORG>
    Date: Monday, November 10, 1997 12:37 PM
    Subject: L0pht Advisory: IE4.0
   =20
   =20
          Document:  L0pht Security Advisory
        URL Origin:  http://l0pht.com/advisories.html
      Release Date:  November 1st, 1997
       Application:  Microsoft Internet Explorer 4.0 Suite
          Severity:  Viewing remote HTML content can execute arbitrary =
native code
            Author:  dildog () l0pht com
    Operating Sys:  Windows 95
   =20
    =3D=3D=3D=3D=3D=3D=3D=3D
    Scenario
    =3D=3D=3D=3D=3D=3D=3D=3D
   =20
      The Microsoft Internet Explorer 4.0 Suite, including all programs =
supplied
      with it that read and/or process HTML from either local machines, =
intranet
      machines, or remote internet machines are subject to a buffer =
overflow in the
      HTML decoding process. The buffer overflow can cause the =
application to page
      fault, or in the worst case, execute arbitrary precompiled native =
code.
   =20
    =3D=3D=3D=3D=3D=3D=3D
    Example
    =3D=3D=3D=3D=3D=3D=3D
   =20
      1. Copy the supplied HTML file(s) into a location that is =
accessible via the
         target application.
      2. Point to it. Look at it.
      3. Click on the link. (or let someone click it for you)
      4. Become aware of what happens to your machine.
      5. Freak out and beg Microsoft to make the bad man stop.
   =20
      The critical problem here is a buffer overflow in the parsing of a =
particular
      new type of URL protocol. The "res://" type of URL is meant to =
allow access
      to a local resource embedded in a local DLL file. This is useful =
for
      archiving entire websites into a DLL and is not, in its truest =
concept, a
      security flaw.
   =20
      For example, to read something out of the IE4.0 Tour (stored in a =
DLL) try
      the following URL: res://ie4tour.dll/page1-6.htm
   =20
      The buffer overflow is on the actual filename specified. To crash =
your
      machine go ahead and try res://blahblahblah ... blahblah/ in your =
Internet
      Explorer window where the amount of 'blah' equals 265 characters.
   =20
      The function that goes through the filename and validates it is =
flawed on
      Windows 95. Without checking the length, the filename is =
uppercased,
      concatenated with '.DLL' if it isn't there already, and in the =
process,
      copied into a fixed size buffer.
   =20
    =3D=3D=3D=3D=3D=3D=3D=3D
    Solution
    =3D=3D=3D=3D=3D=3D=3D=3D
   =20
      Currently, there is no solution available for this flaw. You can't =
set any
      Internet Explorer options to avoid it, and you are not protected =
by any
      level of zone security. Simply don't surf the web, read email or =
view
      net news using Internet Explorer 4.0 until Microsoft puts up a =
hotfix.
   =20

------=_NextPart_000_0009_01BCEDE1.4AA9AE70
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">

<HTML>
<HEAD>

<META content=3Dtext/html;charset=3Diso-8859-1 =
http-equiv=3DContent-Type>
<META content=3D'"MSHTML 4.71.1712.3"' name=3DGENERATOR>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT color=3D#000000 size=3D2>Running Windows NT 4.0/sp3 and I.E. =
4.0=20
(4.71.1712.6) 128-bit extensions:</FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000=20
size=3D2>res://abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz=
123456abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abc=
defghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijkl=
mnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcd/</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>returns:</FONT></DIV>
<DIV><FONT size=3D2>/-</FONT></DIV>
<DIV><FONT size=3D2> Internet Explorer cannot open the internet =
site=20
".." </FONT></DIV>
<DIV><FONT size=3D2>  The specified module could not be =
found.</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2>\-</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>but</FONT></DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2></FONT><FONT=20
size=3D2>res://abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz=
123456abcdefghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abc=
defghijklmnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcdefghijkl=
mnopqrstuvwxyz123456abcdefghijklmnopqrstuvwxyz123456abcde/</FONT></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2>and longer strings return:</FONT></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2>/-</FONT></DIV>
<DIV>
<DIV><FONT size=3D2> Internet Explorer cannot open the internet =
site=20
".." </FONT></DIV>
<DIV><FONT size=3D2>  The filename or extension is too =
long.</FONT></DIV>
<DIV><FONT size=3D2></FONT><FONT color=3D#000000 =
size=3D2>\-</FONT></DIV></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT color=3D#000000 size=3D2>looks like a win95 centric bug to =
me.  Note=20
that I didn't try the exploit.. :-)</FONT></DIV>
<DIV> </DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: =
5px">
    <DIV><FONT face=3DArial size=3D2><B>-----Original =
Message-----</B><BR><B>From:=20
    </B>DilDog <<A=20
    href=3D"mailto:dildog () L0PHT COM">dildog () L0PHT COM</A>><BR><B>To: =
</B><A=20
    href=3D"mailto:BUGTRAQ () NETSPACE ORG">BUGTRAQ () NETSPACE ORG</A> <<A =

    =
href=3D"mailto:BUGTRAQ () NETSPACE ORG">BUGTRAQ () NETSPACE ORG</A>><BR><B>D=
ate:=20
    </B>Monday, November 10, 1997 12:37 PM<BR><B>Subject: </B>L0pht =
Advisory:=20
    IE4.0<BR><BR></DIV></FONT>      =
Document: =20
    L0pht Security Advisory<BR>    URL Origin:  <A=20
    =
href=3D"http://l0pht.com/advisories.html";>http://l0pht.com/advisories.htm=
l</A><BR> =20
    Release Date:  November 1st, 1997<BR>   =
Application: =20
    Microsoft Internet Explorer 4.0 =
Suite<BR>     =20
    Severity:  Viewing remote HTML content can execute arbitrary =
native=20
    code<BR>        Author:  <A=20
    href=3D"mailto:dildog () l0pht com">dildog () l0pht com</A><BR>Operating =
Sys: =20
    Windows =
95<BR><BR>=3D=3D=3D=3D=3D=3D=3D=3D<BR>Scenario<BR>=3D=3D=3D=3D=3D=3D=3D=3D=
<BR><BR>  The=20
    Microsoft Internet Explorer 4.0 Suite, including all programs=20
    supplied<BR>  with it that read and/or process HTML from either =
local=20
    machines, intranet<BR>  machines, or remote internet machines =
are=20
    subject to a buffer overflow in the<BR>  HTML decoding process. =
The=20
    buffer overflow can cause the application to page<BR>  fault, =
or in the=20
    worst case, execute arbitrary precompiled native=20
    =
code.<BR><BR>=3D=3D=3D=3D=3D=3D=3D<BR>Example<BR>=3D=3D=3D=3D=3D=3D=3D<BR=
<BR>  1. Copy the=20
    supplied HTML file(s) into a location that is accessible via=20
    the<BR>     target application.<BR>  2. =
Point to=20
    it. Look at it.<BR>  3. Click on the link. (or let someone =
click it for=20
    you)<BR>  4. Become aware of what happens to your =
machine.<BR>  5.=20
    Freak out and beg Microsoft to make the bad man stop.<BR><BR>  =
The=20
    critical problem here is a buffer overflow in the parsing of a=20
    particular<BR>  new type of URL protocol. The =
"res://" type=20
    of URL is meant to allow access<BR>  to a local resource =
embedded in a=20
    local DLL file. This is useful for<BR>  archiving entire =
websites into=20
    a DLL and is not, in its truest concept, a<BR>  security=20
    flaw.<BR><BR>  For example, to read something out of the IE4.0 =
Tour=20
    (stored in a DLL) try<BR>  the following URL:=20
    res://ie4tour.dll/page1-6.htm<BR><BR>  The buffer overflow is =
on the=20
    actual filename specified. To crash your<BR>  machine go ahead =
and try=20
    res://blahblahblah ... blahblah/ in your Internet<BR>  Explorer =
window=20
    where the amount of 'blah' equals 265 characters.<BR><BR>  The =
function=20
    that goes through the filename and validates it is flawed =
on<BR> =20
    Windows 95. Without checking the length, the filename is=20
    uppercased,<BR>  concatenated with '.DLL' if it isn't there =
already,=20
    and in the process,<BR>  copied into a fixed size=20
    =
buffer.<BR><BR>=3D=3D=3D=3D=3D=3D=3D=3D<BR>Solution<BR>=3D=3D=3D=3D=3D=3D=
=3D=3D<BR><BR>  Currently,=20
    there is no solution available for this flaw. You can't set =
any<BR> =20
    Internet Explorer options to avoid it, and you are not protected by=20
    any<BR>  level of zone security. Simply don't surf the web, =
read email=20
    or view<BR>  net news using Internet Explorer 4.0 until =
Microsoft puts=20
    up a hotfix.<BR></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_0009_01BCEDE1.4AA9AE70--



Current thread: