phpbb and sql errors

Today´s Diary

If you have more information or corrections regarding our diary, click here to contact us.

Published: 2009-07-13,
Last Updated: 2009-07-15 02:21:05 UTC
by Adrien de Beaupre (Version: 10)
0 comment(s) Facebookacebook witter

Update1: The vulnerability is being actively exploited on web sites. More to follow.

Microsoft has released an advisory related to an Office Web Components ActiveX vulnerability, it is available here. This vulnerability exists in the ActiveX control used by IE to display Excel spreadsheets. The CVE entry for the vulnerability is CVE-2009-1136. Microsoft mentions that they are aware of active exploits against this vulnerability, although we at the SANS Internet Storm Center haven't seen it used or mentioned in public as of yet (this has changed, we are seeing active exploit pages). Which may tend to indicate it has been used in targeted rather than broad based attacks. At the moment there is no patch, there is a workaround, and it can be automated for enterprise deployment. The specific CLSIDs to set the killbit for are:

{0002E541-0000-0000-C000-000000000046}
{0002E559-0000-0000-C000-000000000046}

Start working on this on ASAP. The impact is remote code execution with the privileges of the logged in user running Internet Explorer, and might not require user intervention. As in browse to a nasty web site and be pwn3d.

Advisory: http://www.microsoft.com/technet/security/advisory/973472.mspx

KB article: http://support.microsoft.com/kb/973472

SRD blog: http://blogs.technet.com/srd/archive/2009/07/13/more-information-about-the-office-web-components-activex-vulnerability.aspx

MSRC blog: http://blogs.technet.com/msrc/archive/2009/07/13/microsoft-security-advisory-973472-released.aspx

There is a long list of affected products:

  • Microsoft Office XP Service Pack 3;
  • Microsoft Office 2003 Service Pack 3;
  • Microsoft Office XP Web Components Service Pack 3;
  • Microsoft Office Web Components 2003 Service Pack 3;
  • Microsoft Office 2003 Web Components for the  2007 Microsoft Office system Service Pack 1;
  • Microsoft Internet Security and Acceleration Server 2004 Standard Edition Service Pack 3;
  • Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition Service Pack 3;
  • Microsoft Internet Security and Acceleration Server 2006;
  • Internet Security and Acceleration Server 2006 Supportability Update;
  • Microsoft Internet Security and Acceleration Server 2006 Service Pack 1; and
  • Microsoft Office Small Business Accounting 2006.

For information on how to prevent ActiveX controls from running check out this Microsoft KB article on modifying the registry. This article describes how to deploy using Active Directory. If you have administrative privileges on a single system and are running Internet Explorer, you can click on this 'fixit' link to set the killbit and mitigate the vulnerability on a home computer for example.

Update1: The vulnerability is being actively exploited on web sites. More to follow.

Update2: One other obvious mitigation step is to use an alternate web browser (as in other than IE) that does not make use of ActiveX.

Update3: We have raised the Infocon to yellow for 24 hours due to the active exploitation of this vulnerability.

Update4: We will be updating our existing diary post of domains to block with domains that are hosting this exploit as well.  You can see that diary entry at the following url.   http://isc.sans.org/diary.html?storyid=6739 (newly added domains are in yellow) - AndreL

Update5: Attack vectors used to exploit this vulnerability.

  1. The now known public attempts to exploit the vulnerability, attackers just modify the code with a fresh download and payload to slightly modified malware.
  2. A .cn domain using a heavily obfuscated version of the exploit - which may become an attack kit (think MPACK)and is similar to recent DirectShow attacks.
  3. A highly targeted attack against an organization earlier today who received a Microsoft Office document with embedded HTML.  This one was particularly nasty, it was specifically crafted for the target - with the document being tailored with appropriate contact information and subject matter that were specific to the targeted recipient. Analysis of the document and secondary payload found the attacker used a firewall on the malicious server so that all IP traffic outside of the targeted victim's domain/IP range would not reach with the server.

Update6: This blog has additional information, with examples of code that may have been used in this attack. hxxp://safelab.spaces.live.com/blog/cns!A6B213403DBD59AF!1463.entry (obscured on purpose, some AV products will trigger accessing the page. Another example is here: hxxp://xeye.us/blog/2009/07/one-0day/

One part of a signature looking for the exploit would be ActiveXObject("OWC10.Spreadsheet"), which could also be used for legitimate web applications trying to open a spreadsheet.

Update7: attempt at snort sigs (until something better comes along):

alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MS 0day Excel ActiveX1 CVE-2009-1136 ref isc.sans.org/diary.html?storyid=6778"; flow:from_server, established; content:"0002E559-0000-0000-C000-000000000046"; nocase; pcre:"/<OBJECTs+[^>]*classids*=s*[x22x27]?s*clsids*x3as* x7B?s*0002E559-0000-0000-C000-000000000046/si";  classtype:attempted-user; sid:1000099; rev:1;)

alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MS 0day Excel ActiveX2 CVE-2009-1136 ref isc.sans.org/diary.html?storyid=6778"; flow:from_server, established; content:"0002E541-0000-0000-C000-000000000046"; nocase; pcre:"/<OBJECTs+[^>]*classids*=s*[x22x27]?s*clsids*x3as* x7B?s*0002E541-0000-0000-C000-000000000046/si"; classtype:attempted-user; sid:1000101; rev:1;)

Update8: Metasploit have released a module exploiting the vulnerability.

Update9: Matt Hrynkow and John Silvestri have submitted .ADM files for use in Active Directory GPO templates for setting the ActiveX killbits for last week's and this weeks vulnerabilities. Here is the one for The MS Office Web Object 973472 CVE-2009-1136.

--Start here--

CLASS MACHINE
 
CATEGORY "Windows Components"
 
    CATEGORY "Internet Explorer"
        POLICY "Internet Explorer - ActiveX Compatibility Disable for Microsoft Office Web Components"
            #if version >= 3
            EXPLAIN !!EXPLAIN1
            #endif
            KEYNAME "SOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{011B3619-FE63-4814-8A84-15A194CE9CE3}"
            VALUENAME "Compatibility Flags"
            VALUEON NUMERIC 1024
            VALUEOFF NUMERIC 0
            ACTIONLISTON
                KEYNAME "SOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{0002E541-0000-0000-C000-000000000046}"
                VALUENAME "Compatibility Flags" VALUE NUMERIC  1024
                KEYNAME "SOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{0002E559-0000-0000-C000-000000000046}"
                VALUENAME "Compatibility Flags" VALUE NUMERIC  1024
            END ACTIONLISTON
            ACTIONLISTOFF
                KEYNAME "SOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{0002E541-0000-0000-C000-000000000046}"
                VALUENAME "Compatibility Flags" VALUE NUMERIC  0
                KEYNAME "SOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{0002E559-0000-0000-C000-000000000046}"
                VALUENAME "Compatibility Flags" VALUE NUMERIC  0
            END ACTIONLISTOFF
        END POLICY ;Internet Explorer - ActiveX Compatibility Disable for OWC10_and_OWC11

    END CATEGORY ;Internet Explorer
END CATEGORY ;Windows Components

CLASS USER
[Strings]
EXPLAIN1 =Enable this policy to implement workaround documented for Microsoft Security Advisory (973472)nnnhttp://www.microsoft.com/technet/security/advisory/973472.mspxnhttp://isc.sans.org/diary.html?storyid=6778n
--End here--

Update10: This MSDN blog has 32 and 64 bit versions of the Active Directory GPO ADM files and .reg files that should mitigate this vulnerability: http://blogs.msdn.com/askie/archive/2009/07/14/group-policy-adm-template-to-implement-the-workaround-from-security-advisory-973472.aspx The one posted above in Update9 apparently only works on 32 bit, and is missing the backslashes. Thanks Jim and Brian for letting us know.

If you see exploit code for this vulnerability, or have knowledge of it being used in an attack please let us know via our contact page.

Thanks to all who have contributed to this diary!

Cheers,
Adrien de Beaupré
EWA-Canada.com

Teaching SANS Cutting-Edge Hacking Techniques in Ottawa this September.

0 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 22:18:01 UTC
by Swa Frantzen (Version: 1)
0 comment(s) Facebookacebook witter

Oracle's quarterly patch release day was today as well.

Oracle keeps details restricted to customers with an account so we only have access to the overview they publish themselves:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html

Best approach in my experience is to walk through the list with those managing the products such as DBAs and get an action plan in place.

--
Swa Frantzen -- Section 66

0 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 21:04:24 UTC
by Swa Frantzen (Version: 1)
0 comment(s) Facebookacebook witter

The Internet Systems Consortium released patches to their dhcp implementation.

The patches fix a stack overflow in dhclient (the dhcp client) CVE-2009-0692.

Expect a large number of unix and linux distributions as well as third party solutions using dhcp to need an update in the coming days. US-CERT tracks vendors in their VU #410676.

--
Swa Frantzen -- Section 66

Keywords: dhcp patches
0 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 20:14:14 UTC
by Swa Frantzen (Version: 3)
5 comment(s) Facebookacebook witter

Updated story, thanks to for helping figure it out!

The mozilla security blog confirms an exploit against an unpatched vulnerability Firefox 3.5 exists and has been made public.

Do note that Heisse tried to confirm the vulnerability and only managed a crash on Vista and can't seem to make it work on Windows 7 RC1
http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761

The mozilla blog above has a workaround by temporary disabling the javascript.options.jit.content setting in about:config

Alternatively one could install and use NoSCript to disable all javascript by default.

--
Swa Frantzen -- Section 66

Keywords: Firefox
5 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 17:34:08 UTC
by Swa Frantzen (Version: 1)
3 comment(s) Facebookacebook witter

Overview of the July 2009 Microsoft patches and their status.

# Affected Contra Indications Known Exploits Microsoft rating ISC rating(*)
clients servers
MS09-028 Multiple vulnerabilities exist in DirectX and allow for arbitrary code execution with the rights of the logged on user.
Replaces MS08-033 and MS09-011.
DirectShow

CVE-2009-1537
CVE-2009-1538
CVE-2009-1539
KB 971633

Active exploitation of CVE-2009-1537

Addresses SA971778

Severity:Critical
Exploitability:1,1,1
PATCH
NOW
Important
MS09-029 Multiple input validation vulnerabilities allow for arbitrary code execution with the rights of the logged on user.
Replaces MS06-002.
.eot (Embedded OpenType)

CVE-2009-0231
CVE-2009-0232
KB 961371 No known exploits Severity:Critical
Exploitability:1,1
Critical Important
MS09-030 An input validation error allows arbitrary code to be executed with the rights of the logged on user.
Publisher

CVE-2009-0566
KB 969516 No known exploits Severity:Important
Exploitability:1
Critical Important
MS09-031 When using Radius OTP authentication, a user can bypass authentication leading to privilege escalation and access to resources.
ISA server 2006

CVE-2009-1135
KB 970953 No known exploits Severity:Important
Exploitability:1
N/A Critical
(**)
MS09-032 Cumulative killbit update, adds killbits for the recently discussed video ActiveX control.
Note there are recently discovered killbits one should set that are not included in this update.
Replaces MS08-032.
ActiveX killbits

CVE-2008-0015
KB 973346 Workaround for active exploitation included
SA972890
Severity:Critical
Exploitability:1
PATCH
NOW
Important
MS09-033 A privilege escalation problem exists in the handling of privileged instructions on the guest OS.
Virtual PC, Virtual server

CVE-2009-1542
KB 969856 No known exploits Severity:Important
Exploitability:3
Important Important
(***)
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
  • The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
  • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
  • Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
  • All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them

(**): Assuming a worst case scenario

(***): If you use virtual server to create a shared environment and have users accessing virtual machines while not allowing them to manage the system, make that critical.

--
Swa Frantzen -- Section 66

3 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 16:54:17 UTC
by Adrien de Beaupre (Version: 1)
1 comment(s) Facebookacebook witter

After the rush of the new vulnerability being published, exploits in the wild, and malware being distributed it is time to return the Infocon to normal status. Hopefully it has served its purpose of raising awareness of the Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution CVE-2009-1136 and Microsoft advisory 973472.

Cheers,
Adrien

Keywords:
1 comment(s) Facebookacebook witter
Published: 2009-07-13,
Last Updated: 2009-07-14 16:50:13 UTC
by Adrien de Beaupre (Version: 1)
0 comment(s) Facebookacebook witter

The SANS Internet Storm Center has raised the Infocon to yellow for 24 hours to raise awareness of active exploitation of the Office Web Components ActiveX vulnerability in this diary: http://isc.sans.org/diary.html?storyid=6778

As more information is made available the diary will be updated. After 24 hours the Infocon will return to green.

Update1: The Infocon is returning to green.

Cheers,
Adrien de Beaupré
EWA-Canada.com

Teaching SANS Cutting-Edge Hacking Techniques in Ottawa this September.

0 comment(s) Facebookacebook witter
Published: 2009-07-14,
Last Updated: 2009-07-14 14:30:49 UTC
by Swa Frantzen (Version: 1)
7 comment(s) Facebookacebook witter

With the most recent ActiveX vulnerability (CVE-1136-2009) still very fresh and the attacks still evolving out there, reactive protection mechanisms need to update for such exploits rapidly, and as the exploit is quite easy to modify and obfuscate they have their work cut out for them.

Still some out there might get lulled into feeling safe and above all of this e.g.:

  • IPS (or IDS) users e.g. might feel their device will protect them. Let's see: will it protect you if the (hacked) website your user visits is of the https kind ? I'd not be convinced at all.
    Yet the link to a fortinet advisory sent in by Juha-Matti states: "Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against this remote code execution vulnerability"
    Hmm. do get that killbit out there nonetheless, it'll help much more fundamentally.
  • The same goes for other IDS/IPS vendors and most likely for AV vendors as well. Let's not forget there is a metaploit module for this and most of the signature makers I've talked to consider it too hard to make a signature for all possible exploits from metaploit.
  • Then there is those of us who simply don't use windows and/or IE and hardly are surprised ActiveX once again is an attack vector cutting deep. But let's not forget other browsers have their vulnerabilities too. A popular exploit site e.g.mentions a new Firefox Firefox Memory Corruption Vulnerability. And Secunia seems to be confirming it as well (Thanks for the anonymous reports).

So what would I do in a corporate setting? 

  • Get the killbit set ASAP
  • Provide staff up front with a choice of 2 browsers, make sure they know they have a choice (and keep both up to date). This yield diversity which is a good thing. Most importantly be ready to forbid and technically block either one as you need it to keep them safe should it get out of control anyway. Such a measure can be part of your BCP/DRP.
  • Make sure nobody sees this as a reason not to have things like AV and IDS as they will catch some of it, maybe enough, but even more so because too often the AV on a desktop is the only line of defense (e.g. with encrypted traffic)

--
Swa Frantzen -- Section 66

Keywords:
7 comment(s) Facebookacebook witter

If you have more information or corrections regarding our diary, click here to contact us.

Diary Archive

DateAuthorTitle
2009-07-14Swa Frantzen Firefox new exploit
2009-07-14Swa Frantzen ISC DHCP client updated
2009-07-14Swa Frantzen Oracle Black Tuesday
2009-07-14Swa Frantzen Recent attacks and a false sense of security
2009-07-14Swa Frantzen Microsoft July Black Tuesday Overview
2009-07-14Adrien de Beaupre Infocon returning to green from MS Advisory 973472
2009-07-13Adrien de Beaupre Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2009-07-13Adrien de Beaupre * Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-13Adrien de Beaupre Security Update available for Wyse Device Manager
2009-07-12Mari Nichols CA Apologizes for False Positive
Complete Archive
Search Diaries:

StormCast


last update 08 hrs 29 min ago.

Featured Event

Latest Reading Room Papers

Inside a Phish
Scanning Windows Deeper With the Nmap Scanning Engine
A Virtually Secure Browser
Incident Handlers Guide to SQL Injection Worms
Building an Automated Behavioral Malware Analysis Environment using Open Source Software

Poll

Trial software and Bloat pre-installed on new PCs...
... I uninstall/remove right away
... gets overwritten anyway when I install Linux or BSD
... gets overwritten anyway with a fresh install of Windows
... I actually like to try out and sometimes buy
... I keep installed but actually never use

Trends

trends more details

World Map

Worldmap