[97481] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FBI tells the public to call their ISP for help

daemon@ATHENA.MIT.EDU (Douglas Otis)
Sat Jun 16 15:57:11 2007

In-Reply-To: <20070615.163146.16628.2@webmail33.lax.untd.com>
Cc: fw@deneb.enyo.de, nanog@nanog.org
From: Douglas Otis <dotis@mail-abuse.org>
Date: Sat, 16 Jun 2007 12:56:27 -0700
To: Fergie <fergdawg@netzero.net>
Errors-To: owner-nanog@merit.edu



On Jun 15, 2007, at 11:31 PM, Fergie wrote:
> - -- Florian Weimer <fw@deneb.enyo.de> wrote:
>
>> In most parts of the world, the Microsoft EULA is not enforceable. =20=

>> Most users don't buy their software from Microsoft, either.  It's =20
>> preinstalled on their PC, and Microsoft disclaims any support.
>
> NOTE: This has nothing to do with ISPs.
>
> Also, there is somewhere in the neighborhood of > 65M MS hosts "out =20=

> there" that are either illegally or improperly licensed, and which =20
> cannot use Microsoft Update (due to the Genuine Advantage =20
> verification knobs).
>
> While they can download each patch individually through a series of =20=

> acrobatic exercises, this sorta contributes to the whole end-system =20=

> compromise problem.
>
> Again, not that this has much real bearing on the discussion, but =20
> figured I toss that into the mix.

At the prior ISOS conference in Redmond, Microsoft made assurances =20
even systems failing Genuine Advantage verification can enable =20
automatic udpates to obtain critical updates.  One of the attendees =20
remarked privately this automation works only for English versions of =20=

XP. : (

With vulnerabilities created by Microsoft, such as:
   - cloaking files and processes
   - cloaking shell script extensions (even when show enabled)
   - requiring scripts for basic browser functionality
   - preventing removal of their exploitable browser
   - Word
   - .Net
   - inadequate provisions for temporarily privilege escalation
   - unfortunate network defaults
   - reliance upon perimeter security
   - etc.

It seems such negligence might make Micos0ft vulnerable to class =20
actions, especially from ISPs bearing the burnt of related support.  =20
With the FBI recommendation, another very deep pocket might be add.

The paper provided by Google should give anyone cause.
http://www.usenix.org/events/hotbots07/tech/full_papers/provos/=20
provos.pdf

"A popular exploit we encountered takes advantage of a
  vulnerability in Microsoft=92s Data Access Components that
  allows arbitrary code execution on a user=92s computer [6].
  The following example illustrates the steps taken by an ad-
  versary to leverage this vulnerability into remote code exe-
  cution:
  =95 The exploit is delivered to a user=92s browser via an
  iframe on a compromised web page.
  =95 The iframe contains Javascript to instantiate an Ac-
  tiveX object that is not normally safe for scripting.
  =95 The Javascript makes an XMLHTTP request to re-
  trieve an executable.
  =95 Adodb.stream is used to write the executable to disk.
  =95 A Shell.Application is used to launch the newly written
  executable."

-Doug



home help back first fref pref prev next nref lref last post