Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Browsers :: bt151.txt

Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! CRITICAL





------=_NextPart_000_00D4_01C3157B.AADC4970
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Systems Affected : Internet Explorer 6.0.2800 (6.x?)
Remotely exploitable: Yes
Author: Marek Bialoglowy (System Integra - mb@systemintegra.com)
Attached files: dmz2.rar (archive password:zones)

Note: This is part of my research and the purpose of this post is to consult
results and potential vulnerability with the wider group of security
experts.

--------

# Introduction

I've found some sample VB script created by person using nickname 'netric'
and creating large number of FRAMES in Internet Explorer and mass executing
'telnet://www.microsoft.com:80' requests. I believe this dangerous VBS
scripts is known to everyone already (AVP recognizes it as
Trojan.VBS.IFram). Well, I believe it is right moment to inform Bugtraq
about some potential critical vulnerability in Internet Explorer version 6
(maybe 5.5 also ?), which used together with this script (version modified
by me: dmz2.html file) could provide easy way to intrude large number of
workstations on LAN. I've found this security problem while doing research
on techniques of delivering passive Trojans executables trough Outlook
Express and Internet Explorer - anyways very advanced Trojans (project "UTP"
for people familiar with this name).

# Vulnerability

I've noticed that on my test environment it is possible to bypass Internet
Explorer Zones protection by flooding it with large number of file://
requests in example to infected fileserver. The result of this bypass is
EXECUTION OF ANY REQUESTED FILE. My requested file was 'trojan.exe' placed
on neighbour WIN2K Professional workstation. To see code used during the
test check files in attached archive.

On IE 6.0 the result was always the same, after more than 200 dialog boxes
with 'trojan.exe' request, suddenly requested file got executed. For the
purpose of this test I've used two Win2K and WinXP workstations with
Internet Explorer 6.0.2800.1106 (I believe that's most recent version of IE)
and on both workstations opening the 'dmz1.html' file trough LAN share
resulted in executing 'trojan.exe' application. My Internet Security Zone
was set to "MEDIUM".

Internet Explorer 5.x doesn't seam to be vulnerable. I didn't have a chance
to test it on other version of IE 6.x different than 6.0.2800. One person
reported to me that this bug has not affected IE 6.0.2600.

# Exploitation

Well, to make it short: possibility of giving our evil HTML file .jpg
extension, so our "dmz2.html" becomes "photo1.jpg", dramatically increase
scale of the vulnerability. I don't think any Internet Explorer user is
suspecting threat from simple .jpg file ?!? It is also quite hard to stop
all these windows suddenly popping up due to executed VBscript. I believe
people are actually expecting quite high threat from browsing websites (in
this case we can use dmz1.html exploit) using IE and rather don't expect
anything harmful from connecting to http://somewhere.com/pics/photo1.jpg URL
(right?). I will also mention that it requires at least 200 request windows
to pop-up, so if user will kill the iexplorer.exe process before 200
requests will pop-up then attack won't be successful. I think best method of
exploitation is to use VBscript openning the file requests rather than a
single file with requests as SRC of FRAMEs. Presented methods are just few
of many other techniques which which could be used to exploit this
vulnerability.

I don't see potential threat coming from Internet, because this little thing
requires executing > 200 windows which will be quite hard on standard
Internet connection. I believe this vulnerability is dangerous mostly on
LAN, oh and certainly it can allow executing any local file from Internet (I
was not able to execute local file on WinXP).

# Solution

Well, wait for patches ? Other browsers are probably not vulnerable (checked
on Opera). You can also set the Security Zone to HIGH.

Oh and the dangerous VBS script is recognized by AVP and some other
antivirus software, so this is already part of the solution.

--------

Anyways, I am waiting for feedback to confirm my results. Thank you.

PS: Regards to segfault.net and "Lam3rz" group for interesting knowledge
exchange.

Best Regards,

 Marek Bialoglowy (mb@systemintegra.com) Information Security Expert
 PGPkey: http://www.systemintegra.com/pgp/ultor.asc | ID: 0x4B36656E
 JOB: (CTO) System Integra | JKT, Indonesia | Timezone: JAVT, GMT +7

------=_NextPart_000_00D4_01C3157B.AADC4970
Content-Type: application/octet-stream;
	name="dmz.rar"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="dmz.rar"
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------=_NextPart_000_00D4_01C3157B.AADC4970--


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH