Re: Local user can fool another to run executable. .CNT/.GID/.HLP

From: David LeBlanc (dleblancat_private)
Date: Tue Dec 07 1999 - 11:03:07 PST

  • Next message: XB: "FW: NT WinLogon VM contains plaintext password visible in admin"

    At 08:55 AM 12/7/99 CET, Pauli Ojanpera wrote:
    
    >If you delete previously created HELPFILE.GID and edit HELPFILE.CNT, you can
    >change a topic action to run an executable instead of viewing
    >help for that topic. When victim user uses help system and chooses
    >the infected topic, help system runs an executable from path.
    
    I don't think you have to delete the .gid file for this to happen - it is
    just an index for the find feature.  I used to write help systems, and am
    very familiar with what can be done from a help system.  .hlp and .cnt
    files can both be used in a number of ways to make system calls and to
    execute arbitrary binaries, as well as call into DLLs.  I can also call one
    .hlp file from another, and IIRC, can call more than one .hlp file from a
    given .cnt file (which is a text file and easily edited).
    
    If you have a multi-user system, you need to secure all .hlp and .cnt files
    the same as you would .exe files.  If you're worried about .gid files, open
    the associated .hlp file, choose 'find', create the database, and then
    secure it.
    
    >BTW that :Title tag in .CNT files has a kind of buffer overflow. Buffer size
    >is ~256 bytes. I think it triggers when the created
    >.GID file is opened.
    
    I think that this may be the same bug as David Litchfield reported some
    time ago, and which was fixed a while back.  Could you or David please
    confirm whether it is the same bug or not?
    
    
    David LeBlanc
    dleblancat_private
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:18:56 PDT