.NET Framework EncoderParameter integer overflow vulnerability

2012-04-23 Thread Akita Software Security
ss is not available for SilverLight
applications.


Limitations

As noted above, this issue cannot be exploited using a SilverLight
application.

With the release of MS11-044 [11], Microsoft changed the way ClickOnce
& XBAP applications are started. In particular, whenever such an
application is started from the Internet security zone, a dialog is
always shown even if the application does not request elevated
permissions. Previously the application would just start. See also:
http://blogs.msdn.com/b/clrteam/archive/2011/06/06/changes-coming-to-clickonce-applications-running-in-the-internet-zone.aspx

(It is possible to display a green icon in the dialog by code signing
the manifests. When the manifests aren't signed, a red icon is
displayed).

The dialog is not shown for applications launched from the intranet
security zone. In this case the application will start immediately - as
long as it does not request elevated permissions. The intranet zone is
only available when it has been enabled on the target system. This is
common for corporate networks, but less common for home users.

Finally, with the release of Internet Explorer 9 Microsoft chose to
disable XBAP applications in the Internet security zone. See also:
http://blogs.msdn.com/b/ieinternals/archive/2011/03/09/internet-explorer-9-xbap-disabled-in-the-internet-zone.aspx


Windows XP

A special note must be made for Windows XP. It seems that Windows XP is
a bit picky when handling large arrays. In a lot of cases,
OutOfMemoryException exceptions will be thrown when trying to exploit
this issue. Successful exploitation has been achieved on a 32-bit
Windows XP system with 4GB of RAM.


References

[1] http://www.akitasecurity.nl/advisory.html?id=AK20110801
[2] http://technet.microsoft.com/en-us/security/bulletin/ms12-025
[3] http://support.microsoft.com/kb/2671605
[4] http://www.beyondsecurity.com/ssd.html
[5] 
http://weblog.ikvm.net/PermaLink.aspx?guid=b3525cd1-8788-4d6d-b299-4722ddebad94
[6] http://technet.microsoft.com/en-us/security/bulletin/ms12-025
[7] 
http://msdn.microsoft.com/en-us/library/system.drawing.imaging.encoderparameter.aspx
[8] http://msdn.microsoft.com/en-us/library/yf1d93sz%28v=VS.100%29.aspx
[9] 
http://msdn.microsoft.com/en-us/library/system.security.allowpartiallytrustedcallersattribute.aspx
[10] http://msdn.microsoft.com/en-us/magazine/ee677170.aspx
[11] http://technet.microsoft.com/en-us/security/bulletin/ms11-044


-- 
----
Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


Office arbitrary ClickOnce application execution vulnerability

2012-01-12 Thread Akita Software Security
e OLE Package will not result in the dialog as shown in
figure 6. To make a successful attack more likely, an attacker can
format the OLE Package such that it does not look like an embedded file.

A proof of concept was created that utilizes these techniques to create
a very simple game. If the user follows the provided instructions, the
user will launch the ClickOnce application.

http://www.akitasecurity.nl/advisory/AK20100601/007-word_2007_game_poc.png
Figure 7: Screenshot of Word proof of concept.


PowerPoint 2007

PowerPoint allows for Custom Animations to be set for OLE Packages.
Besides the regular animations, we have the option to set two OLE
specific animations (named Object Actions); Activate Contents & Edit
Package. Activate Contents performs the same actions as if the user
double clicks the embedded object. Thus using Custom Animations it is
possible to perform a particular sequence of actions, allowing us to
execute an embedded ClickOnce application with Full Trust permissions.

Doing so will trigger a series of dialog windows, such as the one shown
in figure 6. However there is no need for the user to interact with
these dialog windows. Custom Animations are executed when the PowerPoint
is displayed in Slide Show mode (for example by pressing F5 or double
clicking a .pps or .ppsx file). Since Slide Shows are shown full screen
and focus is regained when an Animation action is executed, it is
possible to hide these dialogs. If the ClickOnce application is launched
it will be possible to send a Windows Message to the dialogs so there
are closed automatically.

On Windows Vista and later, the Edit Package Animation will also cause a
copy of the embedded file to be saved locally. This option will show a
window in which the user can change the label of the OLE Package. Using
this option will block the current Custom Animation until the user
closes the window. Closing the window is (amongst other ways) possible
by clicking the OK or Cancel button, pressing + or
clicking the close button in the title bar. No matter what the user
chooses, the temporary file will persist locally until the PowerPoint
presentation is closed. Consequently, user interaction is required,
however the only way to stop the exploit from running is by closing
PowerPoint through Task Manager.


Macros

It is also possible to perform the steps used in the PowerPoint examples
using Macros. The following Macro will open all embedded OLE Packages
within an Office document:

Private Sub Document_Open()
Dim i As Integer
For i = 1 To ActiveDocument.InlineShapes.Count
ActiveDocument.InlineShapes(i).OLEFormat.Activate
Next i
End Sub


Windows XP

Exploiting this issue on Windows XP using the above described attack
vectors will fail. This is caused by the fact that on Windows XP OLE
Packages are handled by the packager.exe application (Windows Object
Packager) while on Windows Vista and later OLE Packages are handled by
the DLL packager.dll. This is defined in the Registry key
HKEY_CLASSES_ROOT\Package\protocol\StdFileEditing\server. Big difference
between these two is that on Windows XP the temporary file is removed
if packager.exe is closed, while on Windows Vista the file is removed
when the Office document is closed (and the DLL is unloaded). Also the
exe saves its files in the Temporary Internet Files folder while the DLL
uses the user's temporary folder (i.e.
C:\Users\\AppData\Local\Temp).

When an embedded ClickOnce application is launched through its
deployment manifest, the dfsvc.exe service is started. This process is
started detached from packager.exe, which causes packager.exe to think
that the action has finished, causing it to close itself and thus remove
the temporary deployment manifest. This creates a race condition as the
ClickOnce service will try to parse the deployment manifest. As this
file is (in most cases) removed by packager.exe it will fail to do so
and an error message will be displayed.


References

[1] http://www.akitasecurity.nl/advisory.html?id=AK20100601
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0013
[3] http://technet.microsoft.com/en-us/security/bulletin/ms12-005
[4] http://support.microsoft.com/kb/2584146
[5] http://www.beyondsecurity.com/ssd.html


-- 
---

Akamai Download Manager arbitrary file download & execution

2010-07-30 Thread Akita Software Security
 is lagging
behind. The default option of trusting all code from one publisher is
flawed. Publishers that distribute a lot of Java applets, are more
likely to distribute vulnerable applets. Since signed applets are
equivalent to ActiveX controls, this can lead to a full compromise of
user's systems.


References

[1] http://www.akitasecurity.nl/advisory.php?id=AK20090402
[2] http://msdn.microsoft.com/en-us/library/ms682586.aspx
[3] 
http://www.oreillynet.com/onlamp/blog/2008/05/safari_carpet_bomb.html
[4] http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx
[5] http://www.microsoft.com/technet/security/Bulletin/MS09-015.mspx
[6] http://www.microsoft.com/technet/security/advisory/953818.mspx
[7] http://www.microsoft.com/technet/security/advisory/953818.mspx


-- 

Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


Outlook PR_ATTACH_METHOD file execution vulnerability

2010-07-15 Thread Akita Software Security
see also Security Research & Defense blog [4]). 

Executables can be delivered of the web (HTTP), but in this case the
file is loaded through the default web browser that will normally issue
a warning when it is about to run an executable.


References


[1] http://www.akitasecurity.nl/advisory.php?id=AK20091001
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0266
[3] http://www.microsoft.com/technet/security/bulletin/ms10-045.mspx
[4] 
http://blogs.technet.com/b/srd/archive/2010/07/13/ms10-045-microsoft-office-outlook-remote-code-execution-vulnerability.aspx
[5] http://support.microsoft.com/kb/978212
[6] http://support.microsoft.com/kb/2271150
[7] http://www.beyondsecurity.com/ssd.html
[8] http://www.microsoft.com/technet/security/bulletin/ms10-045.mspx


-- 
----
Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


getPlus insufficient domain name validation vulnerability

2010-02-26 Thread Akita Software Security
90401
[2] http://www.adobe.com/support/security/bulletins/apsb10-08.html
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0189
[4]
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=856
[5]
http://aviv.raffon.net/2010/02/18/SkeletonsInAdobesSecurityCloset.aspx
[6]
http://www.nosltd.com/index.php?option=com_content&task=view&id=38&Itemid=26
[7] http://www.nosltd.com/



-- 

Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


FreeWebshop.org: multiple vulnerabilities

2009-12-29 Thread Akita Software Security
is performed on the content of this cookie. This allows attackers to
execute a directory traversal attack and included arbitrary local files,
allowing the disclosure of arbitrary file content or in some cases even
arbitrary code execution if the attacker can manipulate the content of
the included language file. This vulnerability exists in the following
code:

includes/initlang.inc.php:



Setting the cookie cookie_lang to the following value will display the
contents of the /etc/passwd file:

../../../../../../../etc/passwd%00

It should be noted that this attack uses a NULL byte (%00). Because of
this, this attack only works on PHP installations that have disabled
'magic quotes'.


References

[1] http://www.akitasecurity.nl/advisory.php?id=AK20090301
[2] http://freewebshop.org/


-- 

Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://keyserver.pgp.com/vkd/DownloadKey.event?keyid=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


yTNEF/Evolution TNEF Attachment decoder plugin directory traversal & buffer overflow vulnerabilities

2009-09-08 Thread Akita Software Security
t;%s", filename->data);
} else {
sprintf(ifilename, "%s/%s", filepath, filename->data);
}

yTNEF:

void ProcessTNEF(TNEFStruct TNEF) {
[...]   
char ifilename[256];
[...]
if (filepath == NULL) {
sprintf(ifilename, "%s", filename->data);
} else {
sprintf(ifilename, "%s/%s", filepath, filename->data);
}


References


[1] http://www.akitasecurity.nl/advisory.php?id=AK20090601
[2] http://www.ocert.org/advisories/ocert-2009-013.html
[3] http://www.go-evolution.org/Tnef
[4] http://sourceforge.net/projects/ytnef/


-- 

Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://keyserver.pgp.com/vkd/DownloadKey.event?keyid=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part


PulseAudio local race condition privilege escalation vulnerability

2009-07-17 Thread Akita Software Security
 link. If PulseAudio is 
restarted, it will use a path name that at this moment points to a 
different file, for example a command shell. Root privileges are not 
dropped when PulseAudio is reloading, thus allowing a local attacker to 
gain root privileges.

Please note, this attack is only possible if the attacker can create 
hard links on the same hard disk partition on which PulseAudio is 
installed (i.e. /usr/bin and /tmp reside on the same partition).


Proof of concept


The following proof of concept can be used to exploit this issue. The 
proof of concept tries to exploit this issue by creating hard links in 
the /tmp directory.

pa_race [6]

$ ./pa_race
I: caps.c: Limited capabilities successfully to CAP_SYS_NICE.
I: caps.c: Dropping root privileges.
I: caps.c: Limited capabilities successfully to CAP_SYS_NICE.
N: main.c: Called SUID root and real-time and/or high-priority 
scheduling was requested in the configuration. However, we lack the 
necessary privileges:
N: main.c: We are not in group 'pulse-rt', PolicyKit refuse to
 grant us the requested privileges and we have no increase 
RLIMIT_NICE/RLIMIT_RTPRIO resource limits.
N: main.c: For enabling real-time/high-priority scheduling please 
acquire the appropriate PolicyKit privileges, or become a member of 
'pulse-rt', or increase the RLIMIT_NICE/RLIMIT_RTPRIO resource
 limits for this user.
E: pid.c: Daemon already running.
E: main.c: pa_pid_file_create() failed.
[...]
uid=0(root) gid=0(root) groups=4(adm), 20(dialout), 24(cdrom), 
25(floppy), 29(audio), 30(dip), 44(video), 46(plugdev), 107(fuse), 
109(lpadmin), 115(admin), 1000(yorick)
# 


References


[1] http://www.akitasecurity.nl/advisory.php?id=AK20090602
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894
[3] http://www.gentoo.org/security/en/glsa/glsa-200907-13.xml
[4] http://www.ubuntu.com/usn/usn-804-1
[5] http://pulseaudio.org/
[6] http://www.akitasecurity.nl/advisory/AK20090602/pa_race


-- 
----
Akita Software Security (Kvk 37144957)
http://www.akitasecurity.nl/

Key fingerprint = 5FC0 F50C 8B3A 4A61 7A1F  2BFF 5482 D26E D890 5A65
http://keyserver.pgp.com/vkd/DownloadKey.event?keyid=0x5482D26ED8905A65


signature.asc
Description: This is a digitally signed message part