Posted on 01/28/2004 1:10:12 PM PST by Salo
New Explorer hole could be devastating Browser users could be fooled into downloading executable files
By Kieren McCarthy, Techworld.com January 28, 2004
A security hole in Microsoft Corp.s Internet Explorer could prove devastating. Following the exposure of a vulnerability in Windows XP earlier this week, http-equiv of Malware has revealed that Explorer 6 users (and possibly users of earlier versions) could be fooled into downloading what look like safe files but are in fact whatever the author wishes them to be -- including executables.
A demonstration of the hole is currently on security company Secunias website and demonstrates that if you click on a link, and select Open it purports to be downloading a pdf file whereas in fact it is an HTML executable file.
It is therefore only a matter of imagination in getting people to freely download what could be an extremely dangerous worm -- like, for instance, the Doom worm currently reeking havoc across the globe.
However what is more worrying is that this hole could easily be combined with another Explorer spoofing problem discovered in December.
The previous spoofing problem allowed Explorer users to think they were visiting one site when in fact they were visiting somewhere entirely different. The implications are not only troublesome, but Microsofts failure to include a fix for the problem in its January patches has led many to believe it cannot be prevented.
If the same is true for this spoofing issue, then it will only be a matter of time before someone who thinks they are visiting one website and downloading one file will in fact be visiting somewhere entirely different and downloading whatever that sites owner decides.
We also have reason to believe there is no fix. It may be that todays flaw is identical to one found nearly three years ago by Georgi Guninski in which double-clicking a link in Explorer led you to believe you were downloading a text file but were in fact downloading a .hta file.
In both cases, the con is created by embedding a CLSID into a file name. CLSID is a long numerical string that relates to a particular COM (Component Object Model) object. COM objects are what Microsoft uses to build applications on the Internet. By doing so, any type of file can be made to look like a trusted file type i.e. text or pdf.
Guninski informed Microsoft in April 2001. The fact that the issue has been born afresh suggests rather heavily that the software giant has no way of preventing this from happening.
So how bad could it get? Just off the top of our heads -- suppose someone set up a fake Hutton Inquiry site today with a link to the reports summaries -- how many people across the U.K. would download a worm this afternoon? And imagine the computers it would end up on.
The possibilities are endless, and since both spoof issues appear to be unfixable, it must surely place a big question mark over Explorers viability as a browser.
The advice is to avoid this latest hole is always save files to a folder and then look at them. On your hard drive, the files true nature is revealed. But this advice is nearly as practical as Microsoft telling users not to click on links to avoid being caught out by the previous spoof problem.
All in all, it does not look good. Not good at all.
Mozilla Firebird is a free, open-source and cross-platform web browser for Windows, Linux, MacOS X and other operating systems. It is small, fast and easy to use, and offers many advantages over other web browsers, such as the tabbed browsing and the ability to block pop-up windows. Read the full feature list or download Mozilla Firebird 0.7 now.
Find out why people everywhere are switching to Mozilla Firebird. Be sure not to miss the great Introduction to Mozilla Firebird.
I see you are loading your petard again.
Has your rear end healed from the last time you were hoist on it?
Good one, Aruanan!
"Can fifty million Frenchmen (Windows users) be wrong?"
You bet your bippy they can!
Just because something is popular does not mean it is the best... or even good.
Shouldn't that be how do you want to be taken today? ; )
Do you remember Bush2000's horror (read glee!) at Apple not immediately releasing a patch for a minor, non-exploited security hole in OSX?
Strange, here it is Windows with the problem and here he is dancin' and dodgin' again.
This is really funny.
a single serverhost attack is never going to infect millions of systems
When dealing with crime, absolutely yes. And computer piracy is a crime, that should be dealt with by the government.
You anarchists prefer vigilante style justice, something "the mob" can control. Forget it, the only way to root out the criminals from crime detection and prevention is to give it to the government. One of the very few things we need them for.
Strange, I get a couple of messages from them every day, and I've never once seen them blame me for hacker attacks on me or on them.
The law of unintended consequences could affect your argument.
Specifically, this would encourage software vendors to write sloppy code because they can always fix it later.
Forget it, the only way to root out the criminals from crime detection and prevention is to give it to the government
Not following you there about "spam servers", this is the IE hole thread so you need a malware host, and I also don't know what "worm creaming MS" is right now either, there is a "virus" out there that attacks SCO but the worms are all mostly under control by the commercial sites.
Specifically, this would encourage software vendors to write sloppy code because they can always fix it later.
To make a better case for you, some would argue giant corporations wouldn't fix the holes reported to them, but would rather "sit" on them.
I really don't see the benefit of not letting them sit on them, in fact it's much more likely the attack will never be used that if someone who commonly does this like "Chinese X Factor" when they release the malware code itself right on the internet. Ideally they would fix it, but if they didn't, say in the cases of obscure holes, like I said above it probably would never be used, but if it ever was there would be little doubt that "black hatters" released it, because the "white hatters" always notified the vendors first. Now there is too much blurring of the lines.
aka mydoom.
++++++
From Symantec:
W32.Novarg.A@mm is a mass-mailing worm that arrives as an attachment with the file extension .bat, .cmd, .exe, .pif, .scr, or .zip.
When a computer is infected, the worm will set up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources.
In addition, the backdoor can download and execute arbitrary files.
The worm will perform a Denial of Service (DoS) starting on February 1, 2004. It also has a trigger date to stop spreading on February 12, 2004. These two events will only occur if the worm is run between or after those dates. While the worm will stop spreading on February 12, 2004, the backdoor component will continue to function after this date.
The private sector certainly has it's role, just as the hospitals help the homicide detectives. But the ultimate responsibility for identifying and bringing these criminals to justice must be the responsibility of government. Vigilante style justice will never go away, but it is a violation of the law as well.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.