<<< Date Index >>>     <<< Thread Index >>>

RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption



I think Microsoft is using wording to keep the typical end user in a
warm and cozy state. Technically, except for AD services, each client
has a full server implementation and as such should be vulnerable. I
assume that many of those DSL-connected, non-firewalled home machines
are easy targets.

And that the server is more likely to be attacked is just an assumption
- in the days of class A vuln sweeps and random worm scans, I don't
think that servers are at most risk. In fact, I think the unprotected
home machines are...

Rainer 

> -----Original Message-----
> From: Tina Bird [mailto:tbird@xxxxxxxxxxxxxxxxxxxxxxx] 
> Sent: Tuesday, February 10, 2004 9:41 PM
> To: Marc Maiffret
> Cc: Joe Blatz; BUGTRAQ@xxxxxxxxxxxxxxxxx
> Subject: RE: EEYE: Microsoft ASN.1 Library Length Overflow 
> Heap Corruption
> 
> 
> On Tue, 10 Feb 2004, Marc Maiffret wrote:
> 
> > This attack can be performed through various encryption 
> systems such as
> > Kerberos and almost anything using CERTs... I am not sure about
> > Microsofts wording in their advisory.
> 
> Microsoft also states that servers are likelier to be 
> attacked using this
> vulnerability than clients are, because they're likelier to 
> be decoding
> ASN.1 data.  But if the vulnerable code can be accessed via LSASS.exe,
> doesn't that mean all systems are at risk?
> 
> thanks for any info -- tbird
> 
> --
> It doesn't have to be our fault to be our responsibility.
> 
>                                  -- Paul Robertson
> 
> http://www.precision-guesswork.com
> Log Analysis http://www.loganalysis.org
> VPN http://vpn.shmoo.com
> tbird's Security Alerts http://securecomputing.stanford.edu/alert.html
>