-----Original Message----- From: Gregg Shankle [mailto:Gregg.Shankle@private] Sent: Thursday, October 02, 2003 2:53 PM To: boyd_r@private; Gail.Levario@private; geoneve@private; Mike Ruffner; Marcus Beaman; Chris Aldrich; David C Yandell; Barbara A Jensen; Michael S Curtis; Kenneth D Murphy; Steve Payne; Abe Yoakum; HUITT Dale; Pat Pope; Mary.Dover@private Cc: John Salle Subject: Fwd: Message from William Pelgrin-NYS OCSCIC-Cyber Advisory:New Microsoft Internet Explorer Vulnerabilit Cyber Sector FYI from our New York partners- Gregg Shankle, Detective Oregon State Police Office of Public Safety and Security end >>> "Morrissey, Margaret (CSCIC)" <Margaret.Morrissey@private> 10/02/03 01:27PM >>> DATE ISSUED: 10/2/03 NEW YORK STATE OFFICE OF CYBER SECURITY AND CRITICAL INFRASTRUCTURE COORDINATION CYBER ADVISORY SUBJECT: Zero-Day exploit for Internet Explorer vulnerability being used to install Trojan. OVERVIEW: Several sources report that exploits are available for a new vulnerability in Microsoft Internet Explorer (IE) which allows attackers to run malicious code on vulnerable systems. The Qhosts Trojan is actively exploiting one of these vulnerabilities to hijack browser sessions by reconfiguring the DNS configuration on infected systems. Note that Microsoft has not yet issued a patch for this vulnerability. In addition, one New York State agency has identified a minor Qhosts Trojan infection. RISK: Government: - Large and medium government entities: Medium - Small government entities: Medium Businesses: - Large and small businesses: Medium - Small businesses: Medium Home users: Medium SYSTEMS AFFECTED: Systems running Microsoft Internet Explorer 5.01, 5.5, 6.0. DESCRIPTION: By not properly determining the object types returned by a web server, vulnerable versions of IE can allow a remote attacker to execute arbitrary code on the victim box by making use of the HTML object tag which is used to embed ActiveX into HTML pages. The parameter in the object tag which describes the remote location of the data for objects is not checked for validity allowing Trojan executables to be run from within the web page without the user knowing anything is happening. The Qhosts Trojan is one example of how this vulnerability is being exploited. Qhosts changes the Windows registry and HOSTS file to redirect DNS queries to an external host that is, presumably, controlled by a malicious person who can, in turn, redirect infected systems to other web sites. CERT also sites other examples where the vulnerability is being exploited to install denial of service tools or to change dialer programs to make expensive phone calls. RECOMMENDATIONS: 1) Applying the patch indicated by Microsoft Security Bulletin MS03-032 will correct one way to exploit this vulnerability but there are other variations that are not corrected. Once a new patch is issued by Microsoft it should be applied as soon as possible. 2) Until a patch is available, you can try to mitigate the vulnerability by changing the "Run ActiveX controls and plug-ins" in the Internet Zone to either "disable" or "prompt" however both CERT and a posting on Bugtraq indicate this may not mitigate the problem since in some cases the malicious code may not be detected as ActiveX content. Also note that disabling ActiveX may cause problems when accessing existing applications in the Internet Zone. 3) Keep your anti-virus software updated. AV vendors have posted updates to detect Qhosts but that is not the only exploit available. 4) CERT has some additional actions for system administrators that should be evaluated carefully by each organization since they may cause problems with existing business applications. REFERENCES: CERT: http://www.cert.org/incident_notes/IN-2003-04.html BugTraq: http://www.ntbugtraq.com/default.asp?pid=36 <http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0310&L=ntbugtra q&F=P&S=&P=2169> &sid=1&A2=ind0310&L=ntbugtraq&F=P&S=&P=2169 McAfee: http://vil.nai.com/vil/content/v_100719.htm Symantec: http://www.symantec.com/avcenter/venc/data/trojan.qhosts.html SearchSecurity.com http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci9 30187,00.html Microsoft http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur ity/bulletin/MS03-032.asp Neophasis http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0084.html SecurityFocus http://www.securityfocus.com/bid/8456/info/ http://www.securityfocus.com/advisories/5725 _____________________________ William F. Pelgrin Director NYS Cyber Security and Critical Infrastructure Coordination 30 South Pearl Street Albany, New York 12207 518-473-4383 (Phone) 518-402-3799 (Fax) william.pelgrin@private
This archive was generated by hypermail 2b30 : Fri Oct 03 2003 - 08:00:46 PDT