Full Disclosure mailing list archives
Re: windows vulnerability? [was: Re: [Code-Crunchers] 137 bytes]
From: "Thomas Pollet" <thomas.pollet () gmail com>
Date: Wed, 8 Nov 2006 05:38:06 -0800
Hello, On 08/11/06, Gadi Evron <ge () linuxbox org> wrote:
On Wed, 8 Nov 2006, onisan wrote: > One thing is in this makes it even more interesting, most of the firewalls > do not block this download, so it's smallest and most dangerous downloader > at the same time :o What Alex did is very impressive! Matthew Murphy came up with the idea originally, I think, but it doesn't take from this amazing work in any way. *awe struck* I'd say more though, it's a vulnerability. If you can load a library remotely, and do so with no problems, it's a vulnerability in Windows. I am not sure of what kind quite yet.
Windows handles UNC paths the same way as local paths. Another mechanism used to load a remote dll using a UNC path is described in http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/win-usa-04/bh-win-04-litchfield/bh-win-04-litchfield.pdf here the "system" directory is overwritten with a (unc) directory owned by by the attacker. When GetSystemDirectoryW() is called to load the faultrep.dll on exception, an attacker can supply his backdoored faultrep.dll. I don't think you should classify this as a vulnerability, it's known windows behaviour (yet, windows, a vulnerability all by itself?). Regards, Thomas The mother of all downloaders.
"The Zone has a new King!" <we're not worthy x3> -- Jeff, Coupling (BBC, UK). Gadi. > -- G > > 2006/11/8, Solar Eclipse < solareclipse () phreedom org>: > > > > On Tue, Nov 07, 2006 at 10:56:42AM -0800, Peter Ferrie wrote: > > > Why is the idata size present? AFAIK, no Windows version checks it. > > > Four bytes shorter, then (stop at the idata rva non-zero byte)? > > > > You're right, you can remove the last field and bring the file size down > > to 133 bytes. That's what I get for claiming that the size can't be > > improved :-) > > > > Solar > > _______________________________________________ > > Code-Crunchers mailing list > > Code-Crunchers () whitestar linuxbox org > > http://whitestar.linuxbox.org/mailman/listinfo/code-crunchers
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- windows vulnerability? [was: Re: [Code-Crunchers] 137 bytes] Gadi Evron (Nov 08)
- Message not available
- Re: windows vulnerability? [was: Re: [Code-Crunchers] 137 bytes] Thomas Pollet (Nov 08)
- Message not available
- Re: [Code-Crunchers] windows vulnerability? [was: Re: 137 bytes] Gil Dabah (Nov 08)
- Re: [Code-Crunchers] windows vulnerability? [was: Re: 137 bytes] Gadi Evron (Nov 08)