Source: http://www.wired.com/news/print/0,1294,51899,00.html

Another Big MS Browser Hole Found
By Michelle Delio
11:41 a.m. April 17, 2002 PDT


Internet Explorer users who click their browser's back button open the Windows operating system to a malicious hack attack.

When users hit the back button on Explorer's toolbar, the browser's security settings for the "Internet" zone can be bypassed, and the browser will automatically execute malicious code embedded into a site's URL.

 
The problem is caused by what can politely be described as a design flaw in Explorer. When a Web page fails to load, Explorer displays a standard error message. This message is set to operate in the "Local Computer Zone" security setting, which by default allows scripting to run automatically.

Any code inserted in the original URL is handled as if it comes from the same security zone as the last URL viewed. So a URL containing malicious JavaScript that might be blocked by default if a user visits the site directly, will be automatically triggered when the user presses the back button.

Many users hit the back button when a Web page fails to load in a timely manner.

The exploit was discovered by Andreas Sandblad, a Swedish engineering student. Sandblad said he notified Microsoft of the problem last November. He provided additional information to Microsoft on March 25.

"Originally, I was only able to produce the same result when the user pressed the refresh button," Sandblad said in an e-mail. "I contacted Microsoft about it in November and they confirmed the problem. On Feb. 28, I received mail from them saying that they didn't think the problem was serious enough to fix."

"Later, I e-mailed Microsoft with additional information, describing how it was possible to trigger the same flaw with the back button. A couple of days later I received a mail explaining that they might fix the problem in a future service pack. I told them that I was planning to go public with the vulnerability but that I could wait if they could convince me that they were going to fix the issue in reasonable time. They didn't respond at all."

A Microsoft spokesman said the Microsoft Security Response Center thoroughly investigated Sandblad's report "and determined that because the proposed exploit scenario is dependent upon specific user interaction as a prerequisite, it does not meet our definition of a security vulnerability."

"The proposed exploit scenario requires the attacker to compel the users to click on the back button while visiting a malicious website. This scenario does not constitute a viable threat to users following standard best practices," the spokesman added.

Some users were surprised to find out that Microsoft believes that using the back button is not a standard, best security practice.

"Why the hell did they put a back button into the browser toolbar if they didn't want me to use it?" Martin Montez, a stockbroker, wondered. "I'm one of the few people in the world who actually reads the manuals and there's no warning anywhere that using the back button could compromise your system."

Microsoft's spokesman said that the company "remains vigilant in our commitment to keeping users information safe and will be addressing this issue in an upcoming release."

Sandblad said he didn't discover the exploit by accident.

"I have been researching issues regarding the JavaScript protocol for a long time and I found that using the history list together with the back button was a nice way of exploiting it. Often you find flaws that are hard to take advantage of. Mostly, too much user interaction is needed. This one is easy."

Sandblad tested the exploit with Internet Explorer 6.0 on Windows 2000 and XP systems. Further tests by Wired News showed that the exploit also works with various combinations of Internet Explorer 6.0 and 5.5 on computers running Windows 2000, NT 5.0, XP and 98.

The exploit does not work on Macs with current versions of Explorer, or in Mozilla or Opera browsers. Some tested versions of Netscape returned a JavaScript error and crashed.

Some antiviral programs, such as McAfee and F-Secure, were able to block the exploit, and also displayed a "Trojan" or "Code Event" alert.

A Slashdot reader posted a test that allows users to see if their system is vulnerable to the exploit.

Sandblad posted details of the exploit on the BugTraq security mailing list on Wednesday.

In his post, Sandblad suggested the usual fix for browser woes; disable active scripting. He also noted that users could choose never to use the back button.

Programmer Mikal Zabor also suggested that Windows users, those who "must run Explorer," should consider installing the Windows operating system anywhere but their main (C) drive.

"Many exploits assume things about your system. They assume you're running Microsoft products, and they assume your system is on the C drive with the default install. If you move the system off the main drive, or set up partitions, you make it harder for malicious hackers."

Sandblad also said he is still waiting for Microsoft to fix the last vulnerability he reported to the company.

"The patch they released in the bulletin MS02-015 'Cookie-based Script Execution' only fixed part of the problem," Sandblad said.



Edward   ><+>

If you have fifty problems and one of them is government, you have only one problem.
http://www.global-connector.com/
http://groups.yahoo.com/group/reality_pump/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reply via email to