[SECURITY-L] Novas vulnerabilidades no IE e lancamento do Patch Acumulativo
Daniela Regina Barbetti Silva
daniela em ccuec.unicamp.br
Ter Abr 2 11:28:05 -03 2002
----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----
From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject: CAIS-Alerta: Novas vulnerabilidades no IE e lancamento do Patch
Acumulativo
To: <rnp-alerta em cais.rnp.br>, <rnp-seg em cais.rnp.br>
Date: Tue, 2 Apr 2002 08:59:53 -0300 (EST)
-----BEGIN PGP SIGNED MESSAGE-----
Prezados,
O CAIS esta' repassando o alerta da Microsoft, "Microsoft Security
Bulletin MS02-015", que trata da identificacao de duas novas
vulnerabilidades no navegador Internet Explorer e da disponibilizacao do
patch acumulativo.
A primeira vulnerabilidade esta' relacionada `a elevacao de privilegios.
Um atacante que consiga explorar tal vulnerabilidade sera' capaz de
executar remotamente scripts HTML de um site web como se eles fossem
executados localmente, no sistema do usuario. Os scripts podem fazer com
que sejam executadas acoes arbitrarias no sistema. Obviamente, estas acoes
estarao limitadas aos privilegios associados a tal usuario.
A segunda vulnerabilidade esta' relacionada `a execucao remota de
programas residentes na maquina de um usuario.
Em ambos os casos, o atacante pode se valer de tecnicas de engenharia
social para que usuarios desavisados naveguem por paginas
intencionalmente mal-formadas que permitam a exploracao de tais
vulnerabilidades, ou ainda este conteudo HTML malicioso pode ser enviado
via e-mail.
Ressalta-se que o patch divulgado e' acumulativo, ou seja, uma vez
instalado, elimina todas as vulnerabilidades divulgadas anteriormente e
que afetam o IE 5.01, 5.5 e 6, alem das duas novas tratadas neste alerta.
Sistemas Afetados:
. Microsoft Internet Explorer 5.01
. Microsoft Internet Explorer 5.5
. Microsoft Internet Explorer 6.0
Correcoes disponiveis:
http://www.microsoft.com/windows/ie/downloads/critical/Q319182/default.asp
Maiores informacoes:
http://www.microsoft.com/technet/security/bulletin/ms02-015.asp
Identificadores do CVE (http://cve.mitre.org):
. CAN-2002-0077 e CAN-2002-0078
O CAIS recomenda fortemente aos administradores de sistemas Windows que
mantenham seus sistemas atualizados.
Atenciosamente,
################################################################
# CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA / RNP #
# #
# cais em cais.rnp.br http://www.cais.rnp.br #
# Tel. 019-37873300 Fax. 019-37873301 #
# Chave PGP disponivel em: http://www.cais.rnp.br/cais-pgp.key #
################################################################
- ----------------------------------------------------------------------
Title: 28 March 2002 Cumulative Patch for Internet Explorer
Date: 28 March 2002
Software: Internet Explorer
Impact: Two vulnerabilities, the most serious of which
would allow script to run in the Local Computer Zone.
Max Risk: Critical
Bulletin: MS02-015
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-015.asp.
- ----------------------------------------------------------------------
Issue:
======
This is a cumulative patch that includes the functionality of all
previously released patches for IE 5.01, 5.5 and IE 6. In addition,
it eliminates the following two newly discovered vulnerabilities:
- A vulnerability in the zone determination function that could
allow a script embedded in a cookie to be run in the Local
Computer zone. While HTML scripts can be stored in cookies,
they should be handled in the same zone as the hosting site
associated with them, in most cases the Internet zone. An
attacker could place script in a cookie that would be saved
to the user's hard disk. When the cookie was opened by the
site the script would then run in the Local Computer zone,
allowing it to run with fewer restrictions than it would
otherwise have.
- A vulnerability in the handling of object tags that could
allow an attacker to invoke an executable already present
on the user's machine. A malicious user could create HTML
web page that includes this object tag and cause a local
program to run on the victim's machine.
Mitigating Factors:
====================
Cookie-based Script Execution:
- The script would run with the same rights as the user.
The specific privileges the attacker could gain through
this vulnerability would therefore depend on the
privileges accorded to the user. Any limitations on a
user's account, such as those applied through Group
Policies, would also limit the actions of any script
executed by this vulnerability.
Local Executable Invocation via Object tag:
- The vulnerability would not enable the attacker to pass
any parameters to the program. Microsoft is not aware of
any programs installed by default in any version of
Windows that, when called with no parameters, could be
used to compromise the system.
- An attacker could only execute a file on the victim's
local machine. The vulnerability could not be used to
execute a program on a remote share or web site.
- The vulnerability would not provide any way for an
attacker to put a program of his choice onto another
user's system.
- An attacker would need to know the name and location
of any executable on the system to successfully invoke it.
- Outlook 98 and 2000 (after installing the Outlook Email
Security Update), Outlook 2002, and Outlook Express 6 all
open HTML mail in the Restricted Sites Zone. As a result,
customers using these products would not be at risk from
email-borne attacks.
Risk Rating:
============
- Internet systems: Critical
- Intranet systems: Critical
- Client systems: Critical
Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-015.asp
for information on obtaining this patch.
Acknowledgment:
===============
- Andreas Sandblad, Sweden for reporting the Cookie-based Script
Execution issue
- ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT,
INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
*******************************************************************
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv
iQCVAwUBPKmdSekli63F4U8VAQEFRAQAskOOLi4dlNydZMDlMMbB7VdDkBLwTqvj
4No9qQmTX/DCdhN8PVF2vfcqGSAzPrPubl8s7zXsv0G2et5iJmL7LDISkkdlnRtG
+lbW9fMd9yvrsjhAoSIN+fnA0GNuThyW6qw7h9mu/rQA0EJOxVMDotdKKoxiKGfu
xaprKhtZ9l4=
=AhDl
-----END PGP SIGNATURE-----
----- End forwarded message -----
Mais detalhes sobre a lista de discussão SECURITY-L