Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Exploiting design flaws in the Win32 ....
http://www.slashdot.org ^ | recent | Foon, AKA Chris Paget

Posted on 08/06/2002 5:42:07 PM PDT by Amerigomag

Introduction

This paper presents a new generation of attacks against Microsoft Windows, and possibly other message-based windowing systems. The flaws presented in this paper are, at the time of writing, unfixable. The only reliable solution to these attacks requires functionality that is not present in Windows, as well as efforts on the part of every single Windows software vendor. Microsoft has known about these flaws for some time; when I alerted them to this attack, their response was that they do not class it as a flaw - the email can be found here. This research was sparked by comments made by Microsoft VP Jim Allchin who stated, under oath, that there were flaws in Windows so great that they would threaten national security if the Windows source code were to be disclosed. He mentioned Message Queueing, and immediately regretted it. However, given the quantity of research currently taking place around the world after Mr Allchin's comments, it is about time the white hat community saw what is actually possible.

For the rest of the article (the how to) go to the URL.

(Excerpt) Read more at security.tombom.co.uk ...


TOPICS: News/Current Events; Technical
KEYWORDS: computersecurity; microsoft
Another obscure exploit. Maybe .. but this one can't be patched.
1 posted on 08/06/2002 5:42:07 PM PDT by Amerigomag
[ Post Reply | Private Reply | View Replies]

To: Amerigomag
this one can't be patched

Keep hoping, slashdotters. It will probably be fixed before your sixteenth birthday.

2 posted on 08/06/2002 5:51:29 PM PDT by St Louis
[ Post Reply | Private Reply | To 1 | View Replies]

To: Amerigomag
Very nice.
3 posted on 08/06/2002 6:03:33 PM PDT by softengine
[ Post Reply | Private Reply | To 1 | View Replies]

To: Amerigomag
The title should be "Exploiting design flaws in the Win32 API". The API part is important.
4 posted on 08/06/2002 6:03:58 PM PDT by dwollmann
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

On NOW at RadioFR!

Tonight The Shrew will host William S. Lind of the Free Congress Foundation on Radio Free Republic! Tune in to hear one of the foremost military writers discuss the article he has co-written with Paul Weyrich!

Click HERE to listen LIVE while you FReep!

Click HERE to chat in the RadioFR chat room!


5 posted on 08/06/2002 6:04:36 PM PDT by Bob J
[ Post Reply | Private Reply | To 1 | View Replies]

To: St Louis
From the story, and I'm barely computer literate, it seems like I could get in trouble at work using the tools linked in the article to hack one of their servers.
6 posted on 08/06/2002 6:49:04 PM PDT by Abcdefg
[ Post Reply | Private Reply | To 2 | View Replies]

To: Amerigomag
Great, just what we need. Another marginally-employed programmer touting an 'unfixable' OS flaw in lieu of filling out a job application.
7 posted on 08/06/2002 6:58:36 PM PDT by Justa
[ Post Reply | Private Reply | To 1 | View Replies]

To: dwollmann
The API part is important

A balance between boring the average consumer (see reply #2) with a long, techincal title and advising the MS system administrators among us of the potential exploit.

8 posted on 08/06/2002 8:05:35 PM PDT by Amerigomag
[ Post Reply | Private Reply | To 4 | View Replies]

To: Amerigomag
I had two instances yesterday which may indicate this attack. Both showed system-level Outlook access when a browser window was open. In one case a user received an ActiveX security warning when opening his inbox and script was discovered in his Outlook signature. Perhaps a short-term fix would be to disable html in Outlook or better yet, not have Outlook open with a browser window. (I admin. 150 W2K machines and 260 accounts).
9 posted on 08/07/2002 8:28:50 AM PDT by Justa
[ Post Reply | Private Reply | To 8 | View Replies]

To: Amerigomag; Dominic Harr
This attack is nasty.

What the evil progeny fails to mention is the degree of OS corruption which occurs when running System-level script from IE to Outlook, etc. It 'breaks' the OS installation, which imo explains his name for the exploit.

My prediction: He gets sued-to-H and dies a poor and broken fool. To H with jerks like him.

10 posted on 08/08/2002 5:03:44 PM PDT by Justa
[ Post Reply | Private Reply | To 1 | View Replies]

To: Justa
Unless I misunderstand, this wouldn't really be a "new" exploit. Just a new way to hide a trojan.

Trojans could always do just about anything they wanted to, breaking the OS in a wide variety of ways.

Am I mistaken?

It is clever to hide the executing code in a window like that. But if you can run an executable on someone's machine, you can do so many evil things . . .

11 posted on 08/08/2002 5:17:45 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 10 | View Replies]

To: Justa
He gets sued-to-H and dies a poor and broken fool.

Are you referring to the hacker who warned MS and then published the exploit or the MS executive who denied the exploit was a flaw and did not advise his customers of the potential for the problem.

Publishing potential exploits without susbstantial consequence has been commonplace in the past. This circumstance is different however because the patch is a serious limitation on the system and tears the flexibilty out of the heart of the system administration.

In your particular circumstances, until you figure out a way to authenticate system messaging (apparently impossible), you are essentially operating some 260 odd, stand alone PCs which communicate to your company servers at the same level of risk presented by the internet.

Your only level of control rests with your personel department who should not be hiring any individual with programming skills approaching those of a script kiddie. Maybe your company could refuse to hire anybody under 50 years of age.

12 posted on 08/08/2002 6:16:39 PM PDT by Amerigomag
[ Post Reply | Private Reply | To 10 | View Replies]

To: All
RadioFR Tonight...6pm Pacific/9pm Eastern!

Click HERE to Listen LIVE!

Click HERE for the RadioFR Chat Room!


13 posted on 08/08/2002 6:17:49 PM PDT by Bob J
[ Post Reply | Private Reply | To 2 | View Replies]

To: Amerigomag
"In your particular circumstances, until you figure out a way to authenticate system messaging (apparently impossible), you are essentially operating some 260 odd, stand alone PCs which communicate to your company servers at the same level of risk presented by the internet."

Well, you seem to have the crux of the problem there. The permissions elevation comes via an open window, usually an html where the windows' permission is bound to malicious script using the Shatter script. So one method would be to send a virus with the shatter script via e-mail. The shatter script would bind the System-level permissions from an open html window to the virus which is then sent back to Outlook and attached to say, the signature file and mailed out via Contacts or PAB to be run as System on the recipients' computers. The virus would then execute at System level and, in effect destroy the OS. At System level viruses can do anything.

Imo by using Shatter script viruses are no longer dependent upon careless users or some 'flaw' or security hole in Windows. I'm fairly sure I've worked 2 cases of Shatter in the last 2 days which would mean they went thru a firewall and network virus scanner. The viruses were crude and were fixed with a chkdsk /f /v /r but the OSes will likely need to be reinstalled since Task Manager is showing excessive kernal times i.e corruption, and programs are repeatedly breaking down.

Unless fixed the possibilities of future MS viruses using shatter script will be endless. There is no patch for the vulnerability since it is inherent to the OS. I imagine MS could make the type of process buffer you mention and incorporate it into a service pack. Perhaps a journal for System processes?

As a closed source OS I'm sure MS didn't anticipate this being discovered. Nor do I think they could be held liable for another's exploit or work. No doubt there are thousands of such design flaws in the code since it was never expected to run in the open. It's just a pain in the butt for those of us who have to deal with this (and these Freaks) on an almost daily basis. As if my customers' Desktop themes weren't enough....

14 posted on 08/08/2002 9:00:37 PM PDT by Justa
[ Post Reply | Private Reply | To 12 | View Replies]

To: Amerigomag
I haven't looked through his "Stages" in detail but I've already found a bogus claim. His "Alternative techniques" section about exploiting EM_GETLINE is wrong. If he had bothered to read the SDK docs he would have found that the app supplies the maximum length of the buffer to return. Where is the overflow potential???

Anyway, his exploit requires your machine to already be insecure (you need to run his app) so you're already in trouble.

Here's a link to his "I'm getting canned, need a new job" post on securityfocus.com in July 2001: Looking for security research.... Guess he's been on ice for a year and needed to make a big splash.

15 posted on 08/08/2002 9:49:39 PM PDT by mikegi
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson