News

Opinion: Parsing Microsoft's June Patches

Microsoft released 10 new Security Bulletins (MS05-025 through MS05- 034), plus two revisions which included new binaries (MS05-004 and MS05-019), in June. Highlights include:

MS05-025: Cumulative Security Update for Internet Explorer

Two vulnerabilities were addressed in this cumulative update for IE. The first addresses yet another image format buffer overflow, this time in the PNG (Portable Network Graphics) format. The second addresses a vulnerability in how the browser handles certain XML (Extensible Markup Language) requests.

The XML vulnerability might get used as part of phishing attempts since it would be possible for a malicious Web site to request XML data on behalf of the victim, or retrieve XML data from the victim's system (assuming the attacker knew exactly where the XML data resided.)

However, neither represents a significant vulnerability likely to be exploited En masse.

MS05-027: Vulnerability in Server Message Block Could Allow Remote Code Execution

SMB attacks are the most common form of attack Windows systems experience. They've been around for a very long time, attacking TCP ports 139 and 445.

Although this is a new vulnerability, there's nothing unique about this one vs. any of those in the past. Any system already blocking existing SMB attacks will successfully block this one. Any system not already blocking SMB attacks will likely already be compromised from any of the numerous existing bots and/or worms that exist on the Internet today. For some reason there seems to be increased alarm over this vulnerability, but there's no reasonable basis for such alarm.

MS05-029: Vulnerability in Outlook Web Access for Exchange Server 5.5 Could Allow Cross-Site Scripting Attacks

This is the result of another parsing flaw, probably in the way Microsoft validates HTML input. Canonicalization is the process of converting any of the acceptable representations of HTML into presentation form for a browser. Before the HTML is presented by the browser, the input should be scrubbed for unacceptable input; however, OWA fails to do this completely. As a result, it's possible to input HTML that would cause another site to appear within an e-mail message displayed via Outlook Web Access.

The default forms supplied by Microsoft for OWA (and any other Web- based application) should not be accepted "as is." Instead, companies employing such tools should ensure that sufficient additional parsing code is added to these forms to prevent abuse of HTML.

Tools exist for programmatically stepping through HTML content and examining tags, their placement and their parameters. This can be achieved via any .NET language or third-party tools such as Michael Newcomb's HtmlZap ATL Control, www.miken.com/htmlzap/. By incorporating your own parsing routines into such HTML programs, you can ensure that nothing other than what you wish to permit is presented to your users.

MS05-030: Cumulative Update in Outlook Express

If Outlook Express can connect to a malicious Network News Transport Protocol (NNTP) server, that server could send replies to the client which could cause code of the attacker's choice to run on the victim system.

To be exploited by this vulnerability, the NNTP server you connect to must be specially configured to send non-standard responses to requests from Outlook Express. Typically, users connect to a corporately- controlled NNTP server (so undesirable newsgroups and postings aren't available to clients) or to an NNTP server controlled by their Internet Service Provider. Neither is likely to be maliciously configured (although it's possible that an ISP's NNTP server could be compromised.) If outbound connection attempts to arbitrary NNTP servers are permitted, exploitation may be possible.

MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing

The Microsoft Agent ActiveX Control allows a Web site or Web application to provide an interactive character who assists a user. It can prompt a user by pointing to a specific field or form, or explain how to enter data into the application. Primarily it's used as a training assistant, although there are very few limitations in what it can do. The control is enabled on most systems.

The vulnerability permits the Microsoft Agent ActiveX Control to mask security prompts in addition to its other features. As such, it would be possible for a Web site, for example, to try to execute code that would normally trigger a security prompt to warn a user of unsafe code. If such a prompt were hidden by the Microsoft Agent, the user may believe his actions are safe. The Microsoft Agent could go even further, displaying prompts indicating that the actions are safe, further fooling the user.

The most likely use for such an exploit would be in phishing attempts, convincing the user he's on a trusted site when in fact he's on a malicious site.

Any attempt to use the Microsoft Agent ActiveX Control by a Web site will include a reference to the following object Class ID (CLSID), which can be filtered:
D45FD31B-5C6E-11D1-9EC1-00C04FD7081F

MS05-034: Cumulative Security Update for ISA Server 2000

Two vulnerabilities exist in ISA Server 2000. Neither are exploitable if ISA is configured in Firewall Only mode. The only vulnerable systems are those on the internal side of the firewall, attempting outbound connections.

The first involves the HTTP Cache. The vulnerability could permit the cache to become poisoned with false content, but the poisoning must come from content originating from the same IP address as the site being poisoned.

The second involves the NetBIOS Predefined Filter, an optional proxy disabled by default. This would typically be enabled only if the ISA server was allowing unprotected connections to a hosted Web server or similar resource where a VPN couldn't be employed. The vulnerability results in the possibility of connecting to the file system of the ISA server itself via NetBIOS. This could result, for example, in viruses being spread to the ISA server.

MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service

After some reports of problems with a previous installation of a patch, Microsoft re-released the patch, updated to prevent such problems. Microsoft will be prompting all systems to install the new patch, even if the original was already present. The new patch does not prevent any security vulnerability not already prevented by the original version.

Russ Cooper is a Senior Information Security Analyst with Cybertrust, Inc., www.cybertrust.com. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most- recognized security experts, he's often quoted by major media outlets on security issues.

Russ Cooper's Security Watch column appears every Monday in the Redmond magazine/ENT Security Watch e-mail newsletter. Click here to subscribe.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

Featured

comments powered by Disqus

Subscribe on YouTube