Microsoft Baseline Security Analyzer exploit (Exposed vulnerabilities' list)

From: Menashe Eliezer (menasheat_private)
Date: Wed Apr 24 2002 - 18:06:32 PDT

  • Next message: Tech Support: "RE: /lib/ld-2.2.4.so"

    Microsoft Baseline Security Analyzer exploit (Exposed vulnerabilities' list)
    Finjan Software Security Advisory
    URL: http://www.finjan.com/mcrc/alert_show.cfm?attack_release_id=71
    April 24, 2002
    Risk: Medium
    -------------
    
    OVERVIEW
    Microsoft released Baseline Security Analyzer on April 8, 2002. The
    Microsoft Baseline Security Analyzer (MBSA) analyzes Windows systems for
    common security misconfigurations. Version 1.0 of MBSA includes a graphical
    and command line interface that can perform local or remote scans of Windows
    systems. MBSA runs on Windows 2000 and Windows XP systems and will scan for
    missing hotfixes and vulnerabilities in main Microsoft's products. More
    information can be found at:
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/
    tools/Tools/mbsahome.asp
    Microsoft Baseline Security Analyzer (MBSA) is a good security tool.
    However, as a security company, we feel that there is a security risk. After
    MBSA analyzes the system for security vulnerabilities, a report is created
    as a plain text file that includes sensitive information that can be used by
    hackers to attack the specific machine. Any active content object can read
    this information. (Executables, scripts, ActiveX, Java) Even if this report
    can be accessed only by a specific user, the active content can access it
    too. There are many ways to deliver such active content. For example:
    1. Embedded in a web page and utilizing low security settings for the
    browser, or on the user's acceptance of the object.
    2. Embedded in a HTML-formatted e-mail
    3. E-mail attachments.
    4. Executable downloads.
    
    Examples of active content that access the file system can be found at:
    http://www.finjan.com/mcrc/sec_test.cfm
    (If you are using one of Finjan's behavior-based security products, please
    disable it before running these demos)
    Some attacks will be automatic if the browser's security setting is low, for
    example, the Java and the ActiveX demos at the above test site. Based on our
    disclosure policy, we haven't written a specific demo for demonstrating this
    risk, but it would be quite simple to do so.
    We had an interesting discussion with Microsoft about this exploit, and
    their response is quoted in the bottom of this alert.
    Finjan Software warns that this exploit may be used in the wild, and
    strongly advises you to take proper precautions to protect yourself from
    this type of attack.
    
    TECHNICAL OVERVIEW
    MBSA creates a report that includes sensitive information that can be used
    by hackers and save them research time. The report can be accessed by a
    malicious active content:
    1. The report is written to a known folder, e.g., C:\Documents and
    Settings\username\SecurityScans.
    The user cannot change this location.
    2. The XML report is written in plain text and can be used by hackers to
    find the machine's vulnerabilities.
    The problem isn't the option of the automatic attack, even though new
    exploits are published quite often. Users often don't follow Microsoft's
    advice regarding security patches and security settings. Even a user with a
    fully patched version of IE may choose to trust certain active content and
    launch it.
    It is very easy to write malicious active content that will access the MBSA
    report. We don't believe that IE should be changed. Active content risks are
    known (and can be handled by Finjan's behavior-inspection applications).
    
    Mitigating factors:
    If the report is located in an NTFS partition, only the user can access it.
    However, any active content is launched with user permissions and can read
    this information. Such attack won't be automatic on fully patched machines
    with default security settings selected. However, many machines are not so
    "resistant".
    
    Vulnerable Software:
    Microsoft Baseline Security Analyzer (MBSA) 1.0 .
    
    How Microsoft can improve MBSA:
    Taking care of at least one of the following problems will make it more
    difficult for active content to exploit MBSA reports:
    1. Let the user change the default location.
    2. Encode the report and protect it with a password. Upon opening the file,
    a user will be asked for a password in order to decode the file.
    3. Recommend that the user remove the report when it's no longer needed.
    
    PROTECTION
    1) Deploy proactive security solutions to defend against new and unknown
    attacks. (See Finjan's alert for details)
    2) Practice safe computing: Install security patches issued by your software
    vendors, and make sure that security settings are properly defined. Please
    note that user still has the option to trust the active content. Follow MBSA
    recommendations, and this list will be empty...
    3) Move the created "SecurityScans" folder to unpredicted location, and use
    Internet Explorer to read it. Remove the created report when it's no longer
    needed.
    
    
    MICROSOFT RESPONSE
    Finjan Malicious Code Research Center had an interesting discussion with
    Microsoft Security Response Center.
    Their response is attached.
    
    
    --
    Regards,
    Menashe Eliezer
    Manager, Malicious Code Research Center
    Finjan Software - Proactive defense against malicious active content
    Web: http://www.finjan.com/
    
    
    



    This archive was generated by hypermail 2b30 : Wed Apr 24 2002 - 21:41:45 PDT