File: 2589.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (93 lines) | stat: -rw-r--r-- 2,538 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
Rule:

--
Sid:
2589

--
Summary:
This event is generated when an attempt is made to return to
a web client a file in the Content-Disposition Header with a
Class ID (CLSID) embedded in the file name.

--
Impact:
A successful attack may trick a client on a vulnerable host to download
a malicious file that will be executed by the Windows Shell.

--
Detailed Information:
Internet Explorer does not correctly handle or display specially
crafted files in the browser dialogue where the user choses the
action (e.g., open, save, cancel) for a downloaded file.
Specifically, these are overly long file names that employ URL
encoding of "." %2E before the file extension and contain the
Class ID (CLSID) associated with the Windows Shell in the file name.

This serves two purposes; the first is that the file name will
be truncated in the user dialog so the user doesn't see the
CLSID reference, making it appear to be a more innocuous file
with a known extension such as mpg or pdf.  Second, the downloaded
file will actually contain malcious commands that will be
executed by the Windows Shell when opened because of the hidden
CLSID in the file name.

Currently, the only known CLSID that exploits this vulnerability
is associated with the Windows Shell.  Yet, it may be possible
for another CLSID to be discovered in the future that would be
associated with a COM component that could be used for malicious
purposes.

--
Affected Systems:
	Windows NT Workstation/Server 4.0 SP6a
	Windows NT Workstation/Server 4.0 SP6a with Active Desktop
	Windows NT Server 4.0 Terminal Server Edition SP6
	Windows 2000 SP2-SP4
	Windows XP and XP SP1
	Windows XP 64-Bit Edition SP1
	Windows XP 64-Bit Edition Version 2003
	Windows Server 2003
	Windows Server 2003 64-Bit Edition

--
Attack Scenarios:
An attacker can entice a user to visit a web server that
will return a malicious file with a file name that contains
a CLSID, perhaps enabling the execution of the malicious
code when the file is opened.

--
Ease of Attack:
Simple. Exploit code is publicly available.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References
CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0420

Bugtraq:
http://www.securityfocus.com/bid/9510

Other:
http://www.microsoft.com/technet/security/bulletin/ms04-024.mspx

--