Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft To Plug Devastating Browser Download Hole
Newsbytes ^ | 12/12/2001 | Brian McWilliams

Posted on 12/11/2001 9:11:38 PM PST by toupsie

  Microsoft To Plug Devastating Browser Download Hole

By Brian McWilliams, Newsbytes
REDMOND, WASHINGTON, U.S.A.,

11 Dec 2001, 1:09 PM CST Microsoft [NASDAQ:MSFT] will patch a flaw in its Web browser that could allow an attacker to silently download and execute malicious programs on the computers of users who view a specially constructed Web page or e-mail message.

The patch for Internet Explorer (IE) is currently in testing and could be released soon, according to Jouko Pynnonen, a security researcher with Finland's Oy Online Solutions. Pynnonen reported the IE vulnerability to Microsoft on Nov. 19 and recently tested the software fix at the company's request.

The vulnerability affects IE for Windows versions 5, 5.5, and 6, said Pynnonen. Citing the severity of the flaw, he refused to release technical details about the method he found for bypassing the browser's system for securely handling downloaded files.

A Microsoft spokesperson said the company does not currently have any information to share on the issue and declined to discuss the status of the browser patch.

By design, IE should warn users when they attempt to download and open an executable file. But as a result of the security flaw, a malicious Web site could "relatively easily and unnoticeably ... spread virii, install DDoS zombies or backdoors, format hard disks, and so on," wrote Pynnonen in an advisory posted Nov. 26 to Bugtraq, a mailing list for security experts.

Pynnonen revealed that the bug lies in IE's processing of Internet addresses and "header" information that tells the browser what type of file it is handling. The flaw is particularly dangerous because it can be exploited using ordinary Web page code, without help from JavaScript or other scripting programs, he said.

Oy Online Solutions offered to demonstrate the flaw at a private Web site only if recipients of the demo signed an agreement not to disclose information about the exploit.

Chris Wysopal, director of research and development for AtStake, a security consulting firm, characterized the IE download flaw as "a very serious problem" and potentially one of the most severe ever to affect the browser.

However, to exploit the vulnerability, "attackers would probably need control of a Web server so that they could control the information sent in the HTTP header," Wysopal said. As a result, attacks could be traced to the malicious site.

According to Pynnonen, the vulnerability also may affect users of Microsoft's Outlook and Outlook Express e-mail readers, which rely on IE to display messages in Web-page or HTML format. Qualcomm's Eudora e-mail reader, which optionally uses IE for HTML display, could also be vulnerable, he said.

Until the patch is available from Microsoft, Pynnonen said concerned users can temporarily disable IE's ability to download files. To do so, users should select Internet Options from the Tools menu. Then select the Security tab and click on Custom Level. Scroll down to the listing for Downloads and disable file downloads.

Pynnonen's initial advisory on the flaw did not describe the automatic downloading vulnerability and was concerned instead with the browser's failure to properly differentiate between file types.

A subsequent message sent to Microsoft and Bugtraq Nov. 28 described the more serious issues but was not published on Bugtraq by joint agreement between Pynnonen and the list's moderator, the security researcher said.

Microsoft initially denied that the ability to "spoof" file types in IE represented a security vulnerability, but the company later changed its position, according to Pynnonen.

Last month Microsoft patched a security flaw in IE's handling of browser cookie files after Pynnonen reported the vulnerability to the company.

Pynnonen's original report on the IE download spoofing flaw is at http://www.solutions.fi/index.cgi/news_2001_11_26?lang=eng

Microsoft security information site is at http://www.microsoft.com/technet/security/default.asp

Reported by Newsbytes, http://www.newsbytes.com .

13:09 CST
Reposted 13:33 CST

(20011211/WIRES ONLINE, LEGAL, PC/HOLE/PHOTO)


TOPICS: Breaking News; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 261-269 next last
Comment #61 Removed by Moderator

To: hogwaller
Uh, oh. I offended someone's sacred cow.
62 posted on 12/12/2001 4:50:59 AM PST by Fresh Wind
[ Post Reply | Private Reply | To 61 | View Replies]

To: Dominic Harr
Just a few years ago, IE had the nice ability to open programs without the warning message, if you knew the path. (i.e. notepad, calc, etc). I thought it was great! I set up a intranet site that had links that allowed my clients to open applications (including ones that I wrote), that were on their machine or the network.

All fine and good, until someone out in the real world started screaming nah, nah, I found a security bug in IE, nah, nah...

MS then release the patch that brings up the warning message and then put it into their future products. bummer. A great feature gone because of distructive piles of crap that call themselves "hackers."

I would like for MS to put the option of warning then trusting local apps that can be opened from atleast intranet zones.
63 posted on 12/12/2001 5:01:26 AM PST by FreeAtlanta
[ Post Reply | Private Reply | To 18 | View Replies]

To: awestk
I read something a while back about a company microsoft acquired that ran on open systems. They kept it that way rather than hose it up by migrating to MS products.
64 posted on 12/12/2001 5:05:25 AM PST by stainlessbanner
[ Post Reply | Private Reply | To 21 | View Replies]

To: Dominic Harr
Which do you think it was? On purpose, or pure accident?

I'd say option 1, 'on purpose' (like a secret back door that the world found out).

65 posted on 12/12/2001 5:14:23 AM PST by Petronski
[ Post Reply | Private Reply | To 18 | View Replies]

To: Bush2000
I can't use a Mac. I'm heterosexual.

That's the funniest line I've seen in the Apple/Windows war. I think I'll steal it.

The funniest part of it is - it has some foundation in truth. Graphic artists, interior designers, apparel designers - all overwhelmingly use Macs, because they have better software for these applications.

66 posted on 12/12/2001 5:15:29 AM PST by MrB
[ Post Reply | Private Reply | To 9 | View Replies]

To: dandelion
Agreed.

Use Linux.

Microsoft is famous for producing swiss cheese.

I have Linux machines behind a Linksys Cable/DSL router, using ip masquerading (aka Network Address Translation).

external requesters don't get past the router, the machines have ip addresses that can't be seen on the internet. The public ip address belongs to the router, not any of my computers so the external requesters cannot find my machines.

In the US you can get a 4 port Cable/DSL router for less than $100 and they are excellent insurance against intruders, even if you only have one machine.

Of course, routers don't protect against email attacks as your email program invites the malicious software in as attachments. The answer to this problem is to use the Linux operating system as the script kiddies that write the malicious attachments are taking advantage of "features" built into the Microsoft mail software and the holes in the Microsoft operating system.

As I said, Microsoft makes swiss cheese.

67 posted on 12/12/2001 5:23:11 AM PST by Clive
[ Post Reply | Private Reply | To 6 | View Replies]

Comment #68 Removed by Moderator

To: Dominic Harr
See this - Reuters - December 11, 2001 - Antivirus Firms Say They Won't Create FBI Loophole
69 posted on 12/12/2001 5:57:49 AM PST by HAL9000
[ Post Reply | Private Reply | To 18 | View Replies]

To: D-fendr
"We have a near monopoly supplier of tools that are not safe to use for the mass of consumers."

I think this points to the fundamental misunderstanding ... We have a near monopoly supplier that provides tools which are safe enough for the mass of consumers and provide them with the myriad of features that the mass of consumers like. The sophisticated users and critical data people need to take more care. If the mass of consumers were really put out by windows problems, they would go elsewhere. They are not, because elsewhere entails that they become sophisticated users.
70 posted on 12/12/2001 5:58:23 AM PST by gjenkins
[ Post Reply | Private Reply | To 39 | View Replies]

Comment #71 Removed by Moderator

Comment #72 Removed by Moderator

To: All
Will get my links posted and freep mailed this afternoon. I am just too tired to complete it this morning. Sigh! See what happens when you work all night. LOL!!!
73 posted on 12/12/2001 6:09:47 AM PST by RadioAstronomer
[ Post Reply | Private Reply | To 72 | View Replies]

To: All
Here is a site that has a vast amount of information:

http://www.wilders.org/

I will post my links and software selections this afternoon still. :)

74 posted on 12/12/2001 6:17:08 AM PST by RadioAstronomer
[ Post Reply | Private Reply | To 73 | View Replies]

To: Bush2000
I can't use a Mac. I'm heterosexual.

Could have fooled me as often as Windows Users have to take in the rear end because of their operating system's poor security.

75 posted on 12/12/2001 6:17:24 AM PST by toupsie
[ Post Reply | Private Reply | To 9 | View Replies]

To: hogwaller
one box had an uptime of 13 months

My linux firewall had over a year on it before I changed it out for another machine. I'm sitting next to a Sun server that was up over 550 days without a hiccup before we had to unplug it to move it. I pretty much like the reliability of all the *nixes.

/john

76 posted on 12/12/2001 6:17:55 AM PST by JRandomFreeper
[ Post Reply | Private Reply | To 71 | View Replies]

To: toupsie
Unless I am reading this wrong, there is some hype going on here. The information in the article (Newsbytes) does not match up with what is on the actual web site of the person who found this "devastating" security hole.

Here is what the Newsbytes article says:

Microsoft [NASDAQ:MSFT] will patch a flaw in its Web browser that could allow an attacker to silently download and execute malicious programs on the computers of users who view a specially constructed Web page or e-mail message.

But when you go to the web site that describes the bug, it says this:

A piece of HTML can be used to cause a normal download dialog to pop up. The dialog would prompt the user to choose whether he/she wants to "open this file from its current location" or "save this file to disk". The file name and extension may be anything the malicious website administrator (or a user having access there) wishes, e.g. README.TXT, index.html, or sample.wav. If the user chooses the first alternative, "open the file from its current location", an .EXE application is actually run without any further dialogs.

So, the article says that the attacker can "silently download and execute malicious programs" - that's not true. The web site it references says that IE will first pop up a dialog and ask you whether you want to open the download or save it to disk. It's not silent - it asks first.

If you are a fool, and choose to open the download it without examining what you downloaded first, you get bit.

The real bug is that it apparently displays a spoofed filename in the dialog. But it doesn't silently download anything as the article says - am I reading this wrong?

77 posted on 12/12/2001 6:20:08 AM PST by Mannaggia l'America
[ Post Reply | Private Reply | To 1 | View Replies]

To: toupsie
Macs are for wienies !!
78 posted on 12/12/2001 6:21:50 AM PST by aspiring.hillbilly
[ Post Reply | Private Reply | To 1 | View Replies]

To: toupsie
I've got MacOS 9.1 and Opera at home, and Linux with Konqueror a work.

If you buy products from a vertical trust, you can expect low quality products.

I am proud that the rock-ribbed Republican State of Kansas of which I am a resident is still pursuing the break-up or at least severe legal restraint of Microsoft. I suggest that all lovers of the free market read the history of the trusts, and observe that Microsoft, like the trusts of the 19th century could not have obtained its dominant market position nor pursued it's vertical trust strategy without use of state power: gov't standardization, extreme applications of intellectual property law,...

For those who do not think MS is a trust, I suggest studying the Guggenheims' business strategy, not the Rockerfellers'. MS is a vertical trust like the Guggenheims' metals business, not a horizontal trust like Standard Oil.

79 posted on 12/12/2001 6:24:31 AM PST by The_Reader_David
[ Post Reply | Private Reply | To 1 | View Replies]

To: hogwaller
People don't like change. In addition, as a Software Engineer, I can literally waste all of my time doing sys-admin.
80 posted on 12/12/2001 6:32:09 AM PST by gjenkins
[ Post Reply | Private Reply | To 72 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 261-269 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson