Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

[Internet Explorer] New IE spy progie exploits DCOM
The Register USA ^ | 07-02-2002 | Thomas C Greene

Posted on 07/02/2002 5:33:13 PM PDT by JameRetief

A group of Japanese security enthusiasts has developed a little tool called IE'en which exposes traffic between an IE user and any server he's contacting, including logins and passwords over HTTPS.

The group, SecurityFriday, has made the tool available for download here.

To use the tool it's necessary to log in as a current user on a Win-NT or 2K system. Of course if someone can log into your account they already have a great deal of your life in their hands and this is only going to give them a little bit more.

What's interesting here is the ability to capture packets between the client and server by exploiting DCOM (Distributed Component Object Model), a Microsoft program interface allowing the mediation and exchange of program and data objects over a network, similar to CORBA.

According to MS, it "enables software components to communicate directly over a network in a reliable, secure, and efficient manner."

Well, reliable and efficient it may be, but 'secure' is clearly a bit of a stretcher. And as for a workaround, that's easy: make sure you have a strong password for your user account. If you think yours may be weak, or if you've shared it, then reset it. Ten characters involving a combination of lower and upper-case letters, numerals, and special characters will keep you safe from IE'en jockeys. ®


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Extended News; News/Current Events; Technical
KEYWORDS: internet; microsoft; passwords; security; techindex

1 posted on 07/02/2002 5:33:13 PM PDT by JameRetief
[ Post Reply | Private Reply | View Replies]

To: JameRetief
http://www.mozilla.org

Haven't looked back yet.

2 posted on 07/02/2002 5:38:27 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: JameRetief
To use the tool it's necessary to log in as a current user on a Win-NT or 2K system. Of course if someone can log into your account they already have a great deal of your life in their hands and this is only going to give them a little bit more.

This isn't what I would call much of an "exploit" if you already know the current user's username and password. Weak, at best.
3 posted on 07/02/2002 5:40:22 PM PDT by Bush2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: *tech_index
.
4 posted on 07/02/2002 6:42:06 PM PDT by Libertarianize the GOP
[ Post Reply | Private Reply | To 3 | View Replies]

To: Bush2000
This isn't what I would call much of an "exploit" if you already know the current user's username and password. Weak, at best.

I would say that a program that allows you to sniff its' SSL traffic has a security problem.

5 posted on 07/02/2002 6:42:31 PM PDT by ikka
[ Post Reply | Private Reply | To 3 | View Replies]

To: ikka
I would say that a program that allows you to sniff its' SSL traffic has a security problem.

Only if you're logged on as that user, dude. Weak.
6 posted on 07/02/2002 6:43:06 PM PDT by Bush2000
[ Post Reply | Private Reply | To 5 | View Replies]

To: JameRetief
I don't get it. If they can see your https traffic what keeps them from getting your new and improved 10 character password as well?

America's Fifth Column ... watch PBS documentary JIHAD! In America
Download 8 Mb zip file here (60 minute video)

7 posted on 07/02/2002 7:22:14 PM PDT by JCG
[ Post Reply | Private Reply | To 1 | View Replies]

To: sigSEGV
The latest version of Mozilla works great. There are some really nice features that make it attractive, like the tabbed browsing and pop up stoppers.
8 posted on 07/02/2002 8:36:51 PM PDT by JameRetief
[ Post Reply | Private Reply | To 2 | View Replies]

To: JCG
If they can see your https traffic what keeps them from getting your new and improved 10 character password as well?

Hopefully your brain is not so feeble that it can't keep track of multiple passwords.
You use your strongest password on your workstation as a logon password... this protects the workstation and all of the tools you have installed. Then think of different passwords for your network stuff.

9 posted on 07/03/2002 4:51:47 AM PDT by TechJunkYard
[ Post Reply | Private Reply | To 7 | View Replies]

To: ikka
I would say that a program that allows you to sniff its' SSL traffic has a security problem.

Normally I would agree with you. But the article doesn't exactly say that.

It's a remote admin hack on IE using DCOM. The attacker can see and manipulate certain data in the memory space of the remote IE, before it gets formatted / encrypted / sent / rendered... it's not an SSL sniffer.

Looks like it requires Admin privs on the local box and a valid user account on the remote box. It looks like an interesting hole, but no biggie.

10 posted on 07/03/2002 5:11:30 AM PDT by TechJunkYard
[ Post Reply | Private Reply | To 5 | View Replies]

To: JameRetief
"A group of Japanese security enthusiasts..."

Yep, Japanese all right. Read the EULA for the tool:

We have the rights made a patent, the copyrights, and the right of the name etc. of this software. Only if you agree to all the presented items, will we permit you the use of this software. Only you obtain the permission to use this software by agreeing to these conditions. The right to permit use to change, resale to third parties, remodeling, and the copyright notice, etc. are not obtained. We are occasionally setting the use time limit of this software. Please read the explanation of this software about a detailed thing. This limitation prevents that this software is unrestrictedly misused. In this case, after the time limit, you cannot use it. Then, please use a new version or contact us for consultation. You must not use this software for purposes in contradiction to law and general common sense. You can copy this software for backup only. Do not reverse-engineer this software, even what purpose you are or what techniques. This software permits using without any guarantees to you. We are confirming this software operation in our computer environment. However, it does not do guarantee that it operates without causing problems in your environment. You should solve the problem yourself when the software is not normally operating. However, latest information on our homepage might help you in problem solving. We prohibit using this software for all malfeasances, absurd acts, and acts by which others rights are violated. Even if you do those acts with this software, we do not take responsibility. Also, we do not take responsibility about all problems which relate to them. You must assume all those responsibilities. Our judgment gives priority when there is a difference of the opinion between us and you for the recognition of "Absurd act". We occasionally change and revise this software. We do not answer the occurring problem at all as a result. Moreover, we may occasionally cancel the permission to use this software to the user by various laws and International Law, etc. When we declare this cancellation on the homepage, you are lost of the right to use this software. In this case, please promptly stop using and delete the related files.

11 posted on 07/03/2002 5:27:05 AM PDT by Digital Chaos
[ Post Reply | Private Reply | To 1 | View Replies]

To: Digital Chaos
All your password are belong to us.

;-) Happy 4th!

12 posted on 07/03/2002 7:08:11 AM PDT by buickmackane
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson