CRIME UNIRAS Brief - 461/02 - Microsoft - Unchecked Buffer in Windows Shell Could Enable System Compromise

From: Wanja Eric Naef \(IWS\) (w.naef@private)
Date: Thu Dec 19 2002 - 06:30:30 PST

  • Next message: Tao, Greg: "CRIME Any recommendations for data recovery in Oregon?"

    FYI
    
    ------------------------------------------------------------------------
    'Information is the currency of victory on the battlefield.'
    GEN Gordon Sullivan, CSA (1993)
    ------------------------------------------------------------------------
    
    Wanja Eric Naef
    Principal Researcher
    IWS - The Information Warfare Site
    http://www.iwar.org.uk
    
    ------------------------------------------------------------------------
    Join the IWS Infocon Mailing List @
    http://www.iwar.org.uk/general/mailinglist.htm
    ------------------------------------------------------------------------
    
    
    See also Beware the Latest MP3 Worms
    http://www.wired.com/news/technology/0,1282,56924,00.html 
    
    -----Original Message-----
    From: UNIRAS (UK Govt CERT) [mailto:uniras@private] 
    Sent: 19 December 2002 10:43
    To: uniras@private
    Subject: UNIRAS Brief - 461/02 - Microsoft - Unchecked Buffer in Windows
    Shell Could Enable System Compromise 
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    -
    ------------------------------------------------------------------------
    ---------
       UNIRAS (UK Govt CERT) Briefing Notice - 461/02 dated 19.12.02  Time:
    10:44
     UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
    Centre)
    -
    ------------------------------------------------------------------------
    ---------- 
      UNIRAS material is also available from its website at
    www.uniras.gov.uk and
             Information about NISCC is available from www.niscc.gov.uk
    -
    ------------------------------------------------------------------------
    ----------
    
    Title
    =====
    
    Microsoft Security Bulletin - MS02-072:
    
    Unchecked Buffer in Windows Shell Could Enable System Compromise 
    
    Detail
    ====== 
    
    - -----BEGIN PGP SIGNED MESSAGE-----
    
    - -
    ----------------------------------------------------------------------
    Title:      Unchecked Buffer in Windows Shell Could Enable System 
    Compromise (329390)
    Date:       18 December 2002
    Software:   Microsoft Windows XP
    Impact:     Run code of an attacker's choice 
    Max Risk:   Critical
    Bulletin:   MS02-072
    
    Microsoft encourages customers to review the Security Bulletins at: 
    http://www.microsoft.com/technet/security/bulletin/MS02-072.asp
    http://www.microsoft.com/security/security_bulletins/ms02-072.asp
    - -
    ----------------------------------------------------------------------
    
    Issue:
    ======
    The Windows Shell is responsible for providing the basic framework
    of the Windows user interface experience. It is most familiar to
    users as the Windows Desktop, but also provides a variety of other
    functions to help define the user's computing session, including
    organizing files and folders, and providing the means to start
    applications. 
    
    An unchecked buffer exists in one of the functions used by the
    Windows Shell to extract custom attribute information from audio
    files. A security vulnerability results because it is possible
    for a malicious user to mount a buffer overrun attack and attempt
    to exploit this flaw. 
    
    An attacker could seek to exploit this vulnerability by creating
    an .MP3 or .WMA file that contained a corrupt custom attribute
    and then host it on a website, on a network share, or send it via
    an HTML email. If a user were to hover his or her mouse pointer
    over the icon for the file (either on a web page or on the local
    disk), or open the shared folder where the file was stored, the
    vulnerable code would be invoked. An HTML email could cause the
    vulnerable code to be invoked when a user opened or previewed the
    email. A successful attack could have the effect of either causing
    the Windows Shell to fail, or causing an attacker's code to run on
    the user's computer in the security context of the user.
    
    
    Mitigating Factors:
    ====================
     - The vulnerability lies in the Windows Shell, rather than Windows
       Media Player. As a result, playing an audio file with Windows
       Media Player would not pose any additional risk. 
    
     - Outlook 98 and 2000 (after installing the Outlook Email Security
       Update),Outlook 2002, and Outlook Express 6 all open HTML mail in 
       the Restricted Sites Zone. Customers who are using these products
       and who have also installed Windows XP Service Pack 1 or any 
       recent security patch for Internet Explorer that disables frames
       in the Restricted Sites zone would not be at risk from automated
       email-borne attacks. However, these customers could still be
       attacked if they choose to click on a hyperlink in a malicious
       HTML email.
     
     - In the case where an attacker's code was executed, the code 
       would run in the security context of the user. As a result,
       any limitations on the user's ability would also restrict the
       actions that an attacker's code could take. 
    
    Risk Rating:
    ============
     - Windows XP: Critical 
    
    Patch Availability:
    ===================
     - A patch is available to fix this vulnerability. Please read the 
       Security Bulletin at
       http://www.microsoft.com/technet/security/bulletin/ms02-072.asp
       for information on obtaining this patch.
    
    Acknowledgment:
    ===============
     - Foundstone Research Labs (http://www.foundstone.com)
    
    - -
    ---------------------------------------------------------------------
    
    THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
    PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
    ALL 
    WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE 
    WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    IN NO EVENT 
    SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
    DAMAGES 
    WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
    LOSS OF 
    BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
    ITS 
    SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
    STATES DO 
    NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
    OR 
    INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
    
    - -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.1
    
    iQEVAwUBPgDwqI0ZSRQxA/UrAQFfkAf/fqPzXK8/xx4lroE9OW5FrcJ3t8ljtOcx
    jEWZbBxSxdNuBcHTsDdafIYQLpGNafl8EhwLGtUHLm9AY8O/hxrYuf5ag/6ayP7R
    095icpB73J9kwbNESeR2A/DnlCXcP7yuQIfcAlA2RlbeTBXLcUarodIFzGOpVpY8
    ACyYYK6GxptjsG//7blO8u7YLfSVZv/vbJsUk0Nps/lXyJdoL5hiyN7fQ0eZnqxH
    teQXr1t7RWLyymPNYyiYI+XLt6Y7AgO3Nog9XuXKFJ0SPV5t1/ZbrJDCRvyaFEIu
    +ARkFii2mPGTo5VO8ez13JHl8iiN645zKfqvM+iI5Kk8OG0DoBrZgw==
    =CFpx
    - -----END PGP SIGNATURE-----
    
    Reprinted with permission of Microsoft Corporation
    -
    ------------------------------------------------------------------------
    ----------
    
    For additional information or assistance, please contact the HELP Desk
    by 
    telephone or Not Protectively Marked information may be sent via EMail
    to:
    
    uniras@private
    Tel: 020 7821 1330 Ext 4511
    Fax: 020 7821 1686
    
    -
    ------------------------------------------------------------------------
    ----------
    UNIRAS wishes to acknowledge the contributions of Microsoft for the
    information
    contained in this Briefing. 
    -
    ------------------------------------------------------------------------
    ----------
    This Briefing contains the information released by the original author.
    Some 
    of the information may have changed since it was released. If the
    vulnerability 
    affects you, it may be prudent to retrieve the advisory from the
    canonical site 
    to ensure that you receive the most current information concerning that
    problem.
    
    Reference to any specific commercial product, process, or service by
    trade 
    name, trademark manufacturer, or otherwise, does not constitute or imply
    
    its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The
    views 
    and opinions of authors expressed within this notice shall not be used
    for 
    advertising or product endorsement purposes.
    
    Neither UNIRAS or NISCC shall also accept responsibility for any errors 
    or omissions contained within this briefing notice. In particular, they
    shall 
    not be liable for any loss or damage whatsoever, arising from or in
    connection 
    with the usage of information contained within this notice.
    
    UNIRAS is a member of the Forum of Incident Response and Security Teams
    (FIRST) 
    and has contacts with other international Incident Response Teams (IRTs)
    in 
    order to foster cooperation and coordination in incident prevention, to
    prompt 
    rapid reaction to incidents, and to promote information sharing amongst
    its 
    members and the community at large. 
    -
    ------------------------------------------------------------------------
    ----------
    <End of UNIRAS Briefing>
    -----BEGIN PGP SIGNATURE-----
    Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
    
    iQCVAwUBPgGh+4pao72zK539AQHA2AP+OrPGGlxBMLeNHKMqzpovY4fQ0bH7IJkp
    mxYG8wHf4InLTtCdraw1lXx5Gr2zv1lWx7w4u85K4Kcfz0P/u7hMGE9rEu1gS2va
    wWmIJCMK8PaqtYxLRJE67iC6PP972qiXv+THMvuvlqnjUHTxvqEd4rXPLB0N51vs
    gvGr8VlL9q4=
    =ucqF
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Dec 19 2002 - 19:31:15 PST