首页
社区
课程
招聘
第三方组织eEye Digital Security-Windows ANI Zero-Day With eEye Patch
发表于: 2007-3-31 19:48 6488

第三方组织eEye Digital Security-Windows ANI Zero-Day With eEye Patch

2007-3-31 19:48
6488
這幾天出現的重大漏洞! 微軟還沒有補丁..大家可以先用這個..以免中毒.

昨天我们报导了一个Windows .ANI动画即可将Windows Vista陷入Explorer崩溃死循环的消息,目前微软已经确认了这一问题并正在组织解决方案,但第三方的安全组织eEye却先人一步,提供了第三方补丁,这已经不是他们第一次先于微软发布补丁了,至于质量如何,大家不妨可以研究研究.

查看:Windows .ANI Processing Zero-Day Tracker

eEye Digital Security

Windows ANI Zero-Day With eEye PatchHey Readers,
Pretty serious happenings on the zero-day front today so we’ll keep it short and sweet.  Today marked the release of the Windows .ANI Processing zero-day.  This zero-day vulnerability represents one of the most potent zero-days recorded by the Zero-Day Tracker.  Since the vulnerability lies within Windows and is exposed by countless applications, exploit vectors are plentiful for attackers to launch reliable attacks against user32.dll.
eEye’s Blink Neighborhood Watch (LOOK, IT’S FREE!!) was already protecting against this vulnerability with its generic Intrusion Prevention System, so Blink users have nothing to worry about.  For those that may not have Blink installed, eEye Research has diligently been plugging away and has released a patch to mitigate this vulnerability while it remains unpatched by Microsoft.  This patch successfully disabled ALL attack vectors from exploiting users while not causing a disruption in normal use.  As always we suggest that administrators quickly test this against internal web applications prior to installing within their environment.  Or, maybe you should just install Blink and join the many users that don’t have anything to worry about.
You can find all of the technical information as well as the

EEYEZD-20070328

Common Name:
Windows .ANI Processing

Date Disclosed:
3/28/2007

Expected Patch Release:
Unknown

Vendor:
Microsoft

Application:
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista

Description:
An unspecified vulnerability exists within Microsoft Windows which may possibly allow for a remote attacker to execute arbitrary code under the context of the logged in user. This vulnerability requires user interaction by viewing a malicious Windows animated cursor (.ANI) file. .ANI files are commonly used by web developers to display custom cursor animations to enhance web-site experiences.

The most potent attack method is by embedding a malicious .ANI file within an HTML web page. Doing so allows the vulnerability to be exploited with minimal user interaction by simply coaxing a user to follow a hyperlink and visit a malicious web site. Other exploit vectors exist including Microsoft Office applications since they also rely on the same .ANI processing code, making e-mail delivery also a potent threat by using Microsoft Office attachments.

Since .ANI processing is performed by USER32.dll and not the attack vector application itself, all attack vectors have the potential to use a similar exploit with similar address offsets targeted at Windows directly, allowing for a very reliable exploit.

NOTE: This advisory information is gathered from the references below. eEye Research is currently researching the cause of the vulnerability and trying to identify other vulnerable and will update this ZDT entry as more information becomes available.

Severity:
High

Code Execution:
Yes

Impact:
Arbitrary code execution under the context of the logged in user
A web browser remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials. Exploitation impact can vary from the reported trojan installation to full system compromise by coupling this attack with a privilege escalation vulnerability to acquire SYSTEM access.

Mitigation:
eEye Digital Security's Research Team has released a workaround for the zero-day vulnerability as a temporary measure for customers who have not yet installed Blink. Blink generically protects from this and other vulnerabilities without the need for updating and is available for free for personal use on all affected platforms except for Vista. This workaround is not meant to replace the forthcoming Microsoft patch, but rather as a temporary mitigation against this flaw.

The temporary patch mitigates this vulnerability by preventing cursors from being loaded outside of %SystemRoot%. This disallows websites from loading their own, potentially malicious animated icons, while causing little to no business disruption on hosts with the patch installed.

Organizations that choose to employ this workaround should take the steps required to uninstall it once the official Microsoft patch is released. More information regarding installation and uninstallation is available in the patch installer. Please note that at this time this workaround supports all affected platforms except for x64 and Itanium architectures.

Patch Location: Download Now!
Patch Version: 1.0
Patch Source Code: View

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (6)
雪    币: 615
活跃值: (1132)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
2
漏洞利用程序那么快就出现了
接着就是非官方补丁~ 疯了
2007-3-31 20:04
0
雪    币: 375
活跃值: (12)
能力值: ( LV8,RANK:130 )
在线值:
发帖
回帖
粉丝
3
真是牛啊~

令人吃惊
2007-3-31 20:30
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
4
1个月前就已经出来了,在idefense就有了。
22222222222222222222old..
2007-3-31 22:47
0
雪    币: 615
活跃值: (1132)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
5
2007-4-1 15:28
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
以前一直看到一些软件作者一味的埋怨和诋毁看雪论坛的朋友,现在派上用场了吧。。。。。。
官方没出补丁非官方补丁就出来了,强!逆向作用大
2007-4-1 16:35
0
雪    币: 200
活跃值: (13)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
此修正已經被破解了!

eEye擋不住了
MS Windows Animated Cursor (.ANI) Remote Exploit (eeye patch bypass)
http://www.milw0rm.com/exploits/3636
2007-4-2 13:47
0
游客
登录 | 注册 方可回帖
返回
//