Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 10-01-2003, 11:49 PM   #1
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
For thoose with changed hostfiles, ye you're hacked.

Short version:
---
Ppl are activly exploiting the, still unpatched, Internet Explorer HTA vuln. This vuln is ~1-2 weeks old now, still no real patch from microsoft. Be afraid, be very afraid =).
---


Long version:
---
Yesterday NTBugtraq was informed of an active attack against users of
Internet Explorer. I'd like to thank Steve Shockley for informing me.

The attack comprised of a banner, hosted by FortuneCity.com, which in
turn used Java-Script to redirect the self-closing "pop-under" banner to
a site hosted by EV1.NET (Everyone's Internet.) An EV1.NET site then
delivered executable code which in turn invoked the HTA vulnerability.

The HTA vulnerability is a known and as yet unpatched vulnerability in
IE.

Interestingly, vulnerability was described thoroughly by Thor Larholm on
Monday at the 5th annual NTBugtraq Retreat, prior to notification of the
active attack. He explains it much better than I, but my short version
is;

When the Object Data vulnerability is exercised, IE renders and executes
the ActiveX object referenced in the hahahahahahahahahaha code. During the check
to determine whether the content is safe, IE mistakenly believes the
ActiveX object code to be simple HTML/Jscript. Therefore, it does not
prompt to save to disk. Subsequently, it remembers it is HTA content,
and invokes MSHTA.EXE to drop and execute the object code. That code is
x[1].hta, which in turn creates and executes AOLFIX.exe.

AOLFIX.EXE is downloaded into the \temp directory and executed, and
deleted.

It caused a variety of actions;

1. It created empty directories called;

%systemdrive%:\bdtemp
%systemdrive%:\bdtemp\temp

2. It deleted AOLFIX.EXE

3. It created the following file, which contains the letter "A";

%systemdrive%:\%systemroot%\winlog

4. It created a hosts file in the \%systemroot%\help directory which
contains numerous static IP address to search engine website mappings.

5. It created the following registry entries;

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters\I
nterfaces\windows]
"r0x"="your s0x"
"NameServer"="69.57.146.14"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters\I
nterfaces\{45F95E82-B443-428B-9EB7-4C65CDCD9006}]
"NameServer"="69.57.146.14"

HKEY LOCAL MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Pa rameters
"DataBasePath"="%SystemRoot%\help"

At last check (8:15pm EDT 10/1/2003) the banner page at FortuneCity.com
was still serving up the banner which leads to the malcode.

We have received reports from many locations around the world indicating
they have had the effects of this. NAI is calling this QHOSTS-1, see
http://vil.nai.com/vil/content/v_100719.htm for more details.

Thus far there isn't much you can do beyond disabling Active Scripting
(Georgi's old mantra.)

If you apply "default deny", the concept that your perimeter only allows
out that which you have permitted, then outbound DNS by clients will
fail, making them unable to browse or do anything involving DNS
(including internal DNS resolution.) If you don't use "default deny",
consider doing so, or block outbound DNS (port 53) to thwart the
replaced DNS entries.

Personal Firewalls which understand and can block specific applications
from accessing the network (such as Zone Labs, Symantec Personal
Firewall, see what you get if you come to the Retreat!), should be
configured not to allow MSHTA.EXE. The use of MSHTA in this attack
doesn't prevent everything, but it should prevent the redirected DNS
from occurring.

Thor Larholm explained to me why disabling the HTA MIME type works. I
really should've been paying closer attention to his talk rather than
trying to talk over him...;-] Anyway, although IE is failing to properly
handle the content type application/hta when it checks if it should do a
save-as dialog, it does use it when it comes to render. Hence, it
doesn't pop up, but it does use the MIME type to determine what to
invoke when it renders. If you lose the key, even if only temporarily,
it won't find MSHTA.EXE.

It is worth noting that disabling ActiveX (any of the number IE entries
which relate to ActiveX) will do nothing to prevent exploitation of this
vulnerability. The problem lies in the way IE perceives the content, and
while it should recognize it as ActiveX, it does not. Hence disabling
ActiveX will not provide a mitigator.

More tomorrow.

Cheers,
Russ - NTBugtraq Editor
---
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-01-2003, 11:56 PM   #2
Keev
Confirmed User
 
Join Date: May 2001
Posts: 5,335
http://www.gfyboard.com/showthread.p...hreadid=180223

the software Hackthis fixed it all!
Keev is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-02-2003, 12:01 AM   #3
AAnnAArchy
Registered User
 
Join Date: Aug 2002
Location: Las Vegas
Posts: 53
Deleting the hosts file in c:\windows\help\ fixed my problem. I could get to Google, but I was redirected to www2.google.com. Deleting that file and rebooting fixed it.
AAnnAArchy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-02-2003, 12:02 AM   #4
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
Quote:
Originally posted by Keev
http://www.gfyboard.com/showthread.p...hreadid=180223

the software Hackthis fixed it all!
Just the name of that software sends you a warm fuzzy feeling of trust down your spine ;D.
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-02-2003, 12:04 AM   #5
Keev
Confirmed User
 
Join Date: May 2001
Posts: 5,335
lol yea but my hostfile was fucked it redirected every fucking search engine i went to some BS landing page.
Keev is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-02-2003, 12:05 AM   #6
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
... Wonder how many TGP owners that are sending their surfers to cheatergalleries that autoinstalls dialers and spyware without their knowledge right now ...
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-02-2003, 12:11 AM   #7
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
blacklisting the [object] tag in your TGP/MGP script could help some, but then you'll need to blacklist [java-script] too and it prob. exists tons of others ways of exploiting it.
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.