GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   CERT Alert (https://gfy.com/showthread.php?t=311136)

KRL 06-11-2004 02:19 PM

CERT Alert
 
Technical Cyber Security Alert TA04-163A

Cross-Domain Redirect Vulnerability in Internet Explorer

Original release date: June 11, 2004
Last revised: --
Source: US-CERT


Systems Affected

Microsoft Windows systems


Overview

A cross-domain vulnerability in Internet Explorer (IE) could allow an
attacker to execute arbitrary code with the privileges of the user
running IE.


I. Description

There is a cross-domain vulnerability in the way IE determines the
security zone of a browser frame that is opened in one domain then
redirected by a web server to a different domain. A complex set of
conditions is involved, including a delayed HTTP response (3xx status
code) to change the content of the frame to the new domain.
Vulnerability Note VU#713878 describes this vulnerability in more
technical detail and will be updated as further information becomes
available.

Other programs that host the WebBrowser ActiveX control or use the
MSHTML rendering engine, such as Outlook and Outlook Express, may also
be affected.

This issue has been assigned CVE CAN-2004-0549.


II. Impact

By convincing a victim to view an HTML document (web page, HTML
email), an attacker could execute script in a different security
domain than the one containing the attacker's document. By causing
script to be run in the Local Machine Zone, the attacker could execute
arbitrary code with the privileges of the user running IE.

Publicly available exploit code exists for this vulnerability, and
US-CERT has monitored incident reports that indicate that this
vulnerability is being actively exploited.


III. Solution

Until a complete solution is available from Microsoft, consider the
following workarounds.

Disable Active scripting and ActiveX controls

Disabling Active scripting and ActiveX controls in the Internet Zone
(or any zone used by an attacker) appears to prevent exploitation of
this vulnerability. Disabling Active scripting and ActiveX controls in
the Local Machine Zone will prevent widely used payload delivery
techniques from functioning. Instructions for disabling Active
scripting in the Internet Zone can be found in the Malicious Web
Scripts FAQ. See Microsoft Knowledge Base Article 833633 for
information about securing the Local Machine Zone. Also, Service Pack
2 for Windows XP (currently at RC1) includes these and other security
enhancements for IE.

Do not follow unsolicited links

Do not click on unsolicited URLs received in email, instant messages,
web forums, or internet relay chat (IRC) channels. While this is
generally good security practice, following this behavior will not
prevent exploitation of this vulnerability in all cases.

Maintain updated anti-virus software

Anti-virus software with updated virus definitions may identify and
prevent some exploit attempts. Variations of exploits or attack
vectors may not be detected. Do not rely solely on anti-virus software
to defend against this vulnerability. More information about viruses
and anti-virus vendors is available on the US-CERT Computer Virus
Resources page.


Appendix B. References

* Vulnerability Note VU#713878-
<http://www.kb.cert.org/vuls/id/713878>

* Malicious Web Scripts FAQ -
<http://www.cert.org/tech_tips/malici...FAQ.html#steps>

* Computer Virus Resources -
<http://www.us-cert.gov/other_sources/viruses.html>

* CVE CAN-2004-0549 -
<http://cve.mitre.org/cgi-bin/cvename...=CAN-2004-0549>

* Microsoft Knowledge Base Article 833633 -
<http://support.microsoft.com/default.aspx?scid=833633>

* Windows XP Service Pack 2 RC1 -
<http://www.microsoft.com/technet/pro...ro/maintain/wi
nxpsp2.mspx>

* Increase Your Browsing and E-Mail Safety -
<http://www.microsoft.com/security/in.../settings.mspx>

* Working with Internet Explorer 6 Security Settings -
<http://www.microsoft.com/windows/ie/...urity/settings
.mspx>


All times are GMT -7. The time now is 03:46 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123