Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Explorer hole could be devastating
Infoworld ^ | 01/28/04 | Kieren McCarthy

Posted on 01/28/2004 1:10:12 PM PST by Salo

New Explorer hole could be devastating Browser users could be fooled into downloading executable files

By Kieren McCarthy, Techworld.com January 28, 2004

A security hole in Microsoft Corp.’s Internet Explorer could prove devastating. Following the exposure of a vulnerability in Windows XP earlier this week, “http-equiv” of Malware has revealed that Explorer 6 users (and possibly users of earlier versions) could be fooled into downloading what look like safe files but are in fact whatever the author wishes them to be -- including executables.

A demonstration of the hole is currently on security company Secunia’s website and demonstrates that if you click on a link, and select “Open” it purports to be downloading a pdf file whereas in fact it is an HTML executable file.

It is therefore only a matter of imagination in getting people to freely download what could be an extremely dangerous worm -- like, for instance, the Doom worm currently reeking havoc across the globe.

However what is more worrying is that this hole could easily be combined with another Explorer spoofing problem discovered in December.

The previous spoofing problem allowed Explorer users to think they were visiting one site when in fact they were visiting somewhere entirely different. The implications are not only troublesome, but Microsoft’s failure to include a fix for the problem in its January patches has led many to believe it cannot be prevented.

If the same is true for this spoofing issue, then it will only be a matter of time before someone who thinks they are visiting one website and downloading one file will in fact be visiting somewhere entirely different and downloading whatever that site’s owner decides.

We also have reason to believe there is no fix. It may be that today’s flaw is identical to one found nearly three years ago by Georgi Guninski in which double-clicking a link in Explorer led you to believe you were downloading a text file but were in fact downloading a .hta file.

In both cases, the con is created by embedding a CLSID into a file name. CLSID is a long numerical string that relates to a particular COM (Component Object Model) object. COM objects are what Microsoft uses to build applications on the Internet. By doing so, any type of file can be made to look like a “trusted” file type i.e. text or pdf.

Guninski informed Microsoft in April 2001. The fact that the issue has been born afresh suggests rather heavily that the software giant has no way of preventing this from happening.

So how bad could it get? Just off the top of our heads -- suppose someone set up a fake Hutton Inquiry site today with a link to the report’s summaries -- how many people across the U.K. would download a worm this afternoon? And imagine the computers it would end up on.

The possibilities are endless, and since both spoof issues appear to be unfixable, it must surely place a big question mark over Explorer’s viability as a browser.

The advice is to avoid this latest hole is always save files to a folder and then look at them. On your hard drive, the file’s true nature is revealed. But this advice is nearly as practical as Microsoft telling users not to click on links to avoid being caught out by the previous spoof problem.

All in all, it does not look good. Not good at all.


TOPICS: Business/Economy; Extended News; Technical
KEYWORDS: ie; lowqualitycrap; microsoft; ms; security; windows
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 241-250 next last
To: Salo
I'm in favor of America owning Linux, since it's already out there, but only if the GPL is broken. That is what SCO wants to do, and what IBM probably wants to do to, and SCO wants a piece of that. Once Linux gets it's price tag on it and a number to call, there's going to be civil war within "the community".
121 posted on 01/29/2004 6:28:28 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 114 | View Replies]

To: Golden Eagle
You're talking in circles again, what?

No, I'm just trying to explain the obvious to someone who doesn't quite get it.

You're going to need a host, to link to, and if you haven't already rooted the client your only other option is your own server, which would be like robbing a bank but leaving your driver's license.

It isn't difficult to find a host to link to, without leaving any trace back to the perpetrator, if the perpetrator already has a pool of compromised servers to choose from. They won't last much longer than the time it takes to investigate and disassemble the worm, but by then the damage will already be done to everyone who fell for it.

And while you correctly pointed out that firewalls would limit propagation, one could always link back to the compromised system that was used to send the email. It won't work all the time, but it's not necessary for it to work every time. And it would distribute the task and make it much more difficult to stop the propagation.

There's simply not much way this can be exploited, despite the obvious attempt of the author to distract from the Linux virus debacle.

Wow, where do I begin?

  1. Exploiting this bug is trivial and is easily made untraceable. It's not terribly efficient and probably won't spread as wide/fast as recent ones, but if one simply wants a pool of compromised systems for other illegal purposes, it's sufficient.

  2. Salo simply posted a report that was widely distributed among a number of tech news sites. There's no conspiracy here.

  3. What Linux virus? Oh, you mean the Windows worm that you insist was originated by a Linux user? Are we now labeling attacks by the OS that you suspect the perpetrator is running, without any evidence at all?

  4. What debacle? SCO's recent day in court, where they got slapped down by a judge and were ordered to present their evidence in detail, or face dismissal of their suit?

122 posted on 01/29/2004 6:42:37 PM PST by justlurking
[ Post Reply | Private Reply | To 120 | View Replies]

To: Salo
My Explorer won't let me change homepages. It is stuck on some Comcast "spyware warning" page. And right behind it is a full screen white page with another "spyware warning". I get rid of this one with control-alt-delete. But I have not figured out how to get rid of the initial "homepage" that I am now stuck with so I keep spy-sweeping, window-washing, and McAfee virus-scanning whenever I have to use Explorer. In the meantime, I am using Mozilla except when I need Explorer for certain business sites which require Explorer. In that case, I just type in the regular homepage and then go from there. Fortunately, my Explorer bookmarks still work okay. But it makes me nervous anyways - - I would like to get rid of Explorer altogether.
123 posted on 01/29/2004 6:54:34 PM PST by Lancey Howard
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
I might include the individual URLS in TrollAlert version 1.2.

Spoken like a true slashdotter. What we need is a TruthDetector, then you guys would scatter like flies.

Do realize that SUN is borrowing very heavily from those evil open-source types in their use of Gnome as the default desktop?

Yeah that's why I don't have it loaded. What happened to CDE? But Gnome has some proprietary parts you seem to be overlooking.

SUN is also very suportive of the open source movement through their support of the SunFreeWare site.

Yeah and Apple has some involvement too. But they control it, instead of letting possible foreign communists control them. Serious difference you seem oblivious to.

SUN is a hardware company.

They are a technology company just like Apple but with a completely different clientel. I remember this guy that worked for me litterally foaming at the mouth talking about Java one day, that was a new direction for the company to push itself onto the internet, and I used to code Java applets all the time, still have tons on my own personal website.

But they are being destroyed by Open Source, now their operating system is being given away for free, and a near perfect duplicate of their office suite is now being given away too, they are cornered and finally had to sell out to Linux and had a psychiatric breakdown in the press in the proccess. So sad to see it, Apple will be next, they're already morphing into a music company.

124 posted on 01/29/2004 6:59:25 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 115 | View Replies]

To: justlurking
I read your whole post and started to reply but not necessary, the attack you describe is barely dependent if at all on this particular IE hole for success, your questionable assumptions about original and duplicate host productionn and protection notwithstanding.

So while you seem to be very if not interstingly well versed in virus creation methods, this particular hole isn't even necessary for your described exploit, therefore apparently being another attempt to distract attention from the "SCO Denial of Service Worm" (like that one better?).
125 posted on 01/29/2004 7:34:41 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 122 | View Replies]

To: zeugma
Part of that should have read

Do realize that SUN is borrowing very heavily from those evil open-source types in their use of Gnome as the default desktop?

Yeah that's why I don't have it loaded, what happened to CDE? But Gnome has some proprietary parts you seem to be overlooking.

126 posted on 01/29/2004 7:42:12 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 115 | View Replies]

To: Bush2000
OK, you COULD use it in a vbscript, batch, or other active scripting goodie which is default installed on Windows systems, and which are treated as executables by default.

Your mention of CreateFile is a strawman, it's not one I mentioned.

You still could always use the other API call I mentioned previously to grab the environment variable, and stick that variable into the path for use with CreateFile, so CreateFile can do it, you just need an intermediate step.

In other words, you replied to only a part of my post an a method akin to picking fly crap from horse crap, ie, a distinction without a difference.

You said earlier that it was impossible, it's clearly not.
127 posted on 01/29/2004 7:47:28 PM PST by adam_az (Be vewy vewy qwiet, I'm hunting weftists.)
[ Post Reply | Private Reply | To 111 | View Replies]

To: Golden Eagle
"I'm in favor of America owning Linux, since it's already out there, but only if the GPL is broken. That is what SCO wants to do, and what IBM probably wants to do to, and SCO wants a piece of that. Once Linux gets it's price tag on it and a number to call, there's going to be civil war within "the community"."

No kidding, because many parts of it are copyrighted by individuals under the GPL license.

Good to know where you stand on IP theft.
128 posted on 01/29/2004 7:50:01 PM PST by adam_az (Be vewy vewy qwiet, I'm hunting weftists.)
[ Post Reply | Private Reply | To 121 | View Replies]

To: Golden Eagle
I read your whole post and started to reply but not necessary, the attack you describe is barely dependent if at all on this particular IE hole for success, your questionable assumptions about original and duplicate host productionn and protection notwithstanding.

You claimed this exploit wasn't easy to exploit. I explained that it wasn't that hard at all. Now, you claim that the method isn't dependent on the exploit. I presume that means you have conceded that it is not difficult to exploit. If so, we can move on.

You are correct that the methodology isn't dependent on this particular exploit: a variant of the MyDoom worm could do the same thing. But, this exploit is one that could fool some users that know to not open an attachment, but are less cautious about clicking on a link to what claims to be a PDF file. It's just another variation on social engineering.

And if you really think my assumptions are so questionable, check this out:

http://www.interesting-people.org/archives/interesting-people/200307/msg00073.html

It's an article from the NY Times, published last year. It opens:

Hackers Hijack PC's for Sex Sites
By JOHN SCHWARTZ

More than a thousand unsuspecting Internet users around the world have recently had their computers hijacked by hackers, who computer security experts say are using them for pornographic Web sites.

The hijacked computers, which are chosen by the hackers apparently because they have high-speed connections to the Internet, are secretly loaded with software that makes them send explicit Web pages advertising pornographic sites and offer to sign visitors up as customers.

Unless the owner of the hijacked computer is technologically sophisticated, the activity is likely to go unnoticed. The program, which only briefly downloads the pornographic material to the usurped computer, is invisible to the computer's owner. It apparently does not harm the computer or disturb its operation.

The hackers operating the ring direct traffic to each hijacked computer in their network for a few minutes at a time, quickly rotating through a large number. Some are also used to send spam e-mail messages to boost traffic to the sites.

[follow the link to read the rest of the article]

So while you seem to be very if not interstingly well versed in virus creation methods, this particular hole isn't even necessary for your described exploit, therefore apparently being another attempt to distract attention from the "SCO Denial of Service Worm" (like that one better?).

I've been commenting on the article that started this thread. If you want to discuss MyDoom/Novarg, I suggest that you return to the thread that you started.

There have been hundreds of threads started since you posted that one. Despite your apparent belief that FR revolves around the threads that you start, starting another thread on similar or completely different topics doesn't constitute an effort to distract people from yours.

129 posted on 01/29/2004 8:09:01 PM PST by justlurking
[ Post Reply | Private Reply | To 125 | View Replies]

To: Salo
Rofl
130 posted on 01/29/2004 8:12:01 PM PST by Havoc ("Alright; but, that only counts as one..")
[ Post Reply | Private Reply | To 15 | View Replies]

To: FoxInSocks
"Bill Gates sure deserves to be knighted, doesn't he? "

Yes, he's sort of like Monty Python's black knight. "It's just a scratch."
131 posted on 01/29/2004 8:15:41 PM PST by Rocky
[ Post Reply | Private Reply | To 6 | View Replies]

To: adam_az
Good to know where you stand on IP theft.

It's not being stolen. You're giving it away, remember?

132 posted on 01/29/2004 8:16:20 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 128 | View Replies]

To: justlurking
You claimed this exploit wasn't easy to exploit.

I claimed it was very hard to get any significant advantage from this exploit, which is why I got tired of your lectures on proper virus creation which while demonstrating your expertise, you never successfully ever showed it to be of any particular significance in an attack. Therefore, hardly a "devestating" exploit as the author and you seem to have been implying.

As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.

133 posted on 01/29/2004 8:22:30 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 129 | View Replies]

To: Golden Eagle
Therefore, hardly a "devestating" exploit as the author and you seem to have been implying.

Let's see how long it will be before there is a worm "in the wild" that exploits this security hole, and what kind of effect it has.

As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.

There's very little advice in the article, other than the standard "install a firewall". I cited it because I hoped it would help with your difficulty in understanding how "zombied" PC's are widespread, and can be used for all kinds of mischief -- including acting as a server to spread more email worms.

134 posted on 01/29/2004 8:45:41 PM PST by justlurking
[ Post Reply | Private Reply | To 133 | View Replies]

To: Golden Eagle
"It's not being stolen. You're giving it away, remember?"

You mean after all this blustering, you haven't actually READ the GPL?

Free Speech is different than Free Beer.

The rights to use are free under certain restrictions.

Ownership remains with the author.
135 posted on 01/29/2004 8:48:59 PM PST by adam_az (Be vewy vewy qwiet, I'm hunting weftists.)
[ Post Reply | Private Reply | To 132 | View Replies]

To: justlurking
Let's see how long it will be before there is a worm "in the wild" that exploits this security hole, and what kind of effect it has.

Sounds ominous, coming from a Linux guy who understands virii design so well. Hopefully we're safe with you?

Even if one is released it's still going require some sort of a combination attack, that wouldn't even be wholely depedent on this hole even if your other theories could be sustained. Also FYI, according to a new article on CNet a patch is coming right away.

136 posted on 01/29/2004 8:51:45 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 134 | View Replies]

To: adam_az
The rights to use are free under certain restrictions.

And if the GPL is invalidated, ownership still remains with the author. Without explicit permission from the author, use and/or distribution of the software will be a copyright infringement.

And that will pose a problem for SCO, because they are still distributing a GPL'ed Linux kernel to their customers.

If SCO gets their way with the GPL, they are in a heap of trouble (of their own making).

137 posted on 01/29/2004 8:53:56 PM PST by justlurking
[ Post Reply | Private Reply | To 135 | View Replies]

To: adam_az
Ownership remains with the author.

Ownership of GPL code isn't worth a hill of beans. IBM, Novell and others will be profiting off that code, reproducing it, pretty much anything they want to it whether the GPL survives or not.

And those poor authors won't get much in return from the billions in dollars made off their code either. All their software engineering contributions become = the value of running a non-comercial version of the O/S for life.

LOL, what a pitiful return on investment!

138 posted on 01/29/2004 8:56:04 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 135 | View Replies]

To: Golden Eagle
Sounds ominous, coming from a Linux guy who understands virii design so well. Hopefully we're safe with you?

I know very little about viruses and worms, other than how to recognize them. I went for years without running any anti-virus software and never needed any (but I did finally install an open-source mail scanner on my server last year).

But, unlike some of the people that I've encountered lately, I can derive possible outcomes from past history and current information.

Even if one is released it's still going require some sort of a combination attack, that wouldn't even be wholely depedent on this hole even if your other theories could be sustained. Also FYI, according to a new article on CNet a patch is coming right away.

Actually, the article says that Microsoft hasn't stated a release date -- they've only provided information about the feature they are removing in order to fix the problem.

And, there's no indication (in this article) that the fix will address the problem reported yesterday (by Secunia) -- which is the one we have been discussing.

139 posted on 01/29/2004 9:07:52 PM PST by justlurking
[ Post Reply | Private Reply | To 136 | View Replies]

To: Golden Eagle
CDE? CDE!!?? CDE is the one of the most obsolete, clunky desktops in existence. God, shall we just go back to Sunview and be done with it?
Face it, the Communist projects like KDE run so many rings around CDE you might as well be at the Daytona 500.
140 posted on 01/29/2004 9:12:33 PM PST by blowfish
[ Post Reply | Private Reply | To 126 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 241-250 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson