[33660] in bugtraq

home help back first fref pref prev next nref lref last post

Re: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption

daemon@ATHENA.MIT.EDU (Timothy J.Miller)
Thu Feb 12 17:33:24 2004

Mime-Version: 1.0 (Apple Message framework v612)
In-Reply-To: <s029f30d.027@stgeorge.com.au>
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <4F66187B-5C9D-11D8-A5F9-00039359BF60@sackheads.org>
Content-Transfer-Encoding: 7bit
From: "Timothy J.Miller" <cerebus@sackheads.org>
Date: Wed, 11 Feb 2004 08:19:31 -0600
To: BUGTRAQ@securityfocus.com

On Feb 10, 2004, at 4:16 PM, Tim Eddy wrote:

> Marc,
>
> If we remove the default exemptions for Kerberos & RSVP from IPSEC with
> the "NoDefaultExempt" registry key, this still passes IKE. Therefore is
> IKE vulnerable to the ASN bug?

Very likely, as IKE data is marshaled into ASN.1 format.  The fun part 
about ASN.1 is it's so damn useful you tend to use it *everywhere*.

Is anyone else wondering why MS didn't fix this with the last round of 
ASN.1 decoding overflow vulnerabilities (remember the SNMP hole)?  It's 
basically the same problem.

-- Cerebus


home help back first fref pref prev next nref lref last post