[GTER] Problemas com Active Scripting (IE)

Fabiano fabiano.br at uol.com.br
Wed Nov 26 19:06:29 -02 2003


Vale a pena dar uma Conferida,

-------------------------------------------------------------------------
Fonte : http://www.estadao.com.br/tecnologia/internet/2003/nov/26/121.htm
-------------------------------------------------------------------------
Novas (e perigosas) falhas no Internet Explorer

Boletim divulgado pela empresa de segurança dinamarquesa Secunia, aponta 
cinco novas falhas de segurança no Internet Explorer, consideradas 
extremamente críticas.

São Paulo - Os black hackers (hackers do mal) já estão de olho nas cinco 
vulnerabilidades de scripts do Internet Explorer apontadas esta semana pela 
empresa de segurança Secunia, sediada em Copenhague, na Dinamarca.

As falhas permitem acesso a informações confidenciais e à estrutura do 
navegador da Microsoft. Thomas Kristensen, diretor de tecnologia da 
Secunia, considera a questão como “extremamente crítica” e aconselha os 
usuários do Internet Explorer, versão 6.0, a desabilitar o sistema Active 
Scripting.

Por sua vez, a Microsoft recomenda fazer o download da mais recente 
correção para browser, enquanto apura as denúncias das brechas e trabalha 
numa solução para elas.

João Magalhães
---------------------------------------------------------------------------






-------------------------------------------------------------------------
Site : http://www.secunia.com/advisories/10289
-------------------------------------------------------------------------
 >>>Internet Explorer System Compromise Vulnerabilities


Secunia Advisory: SA10289
Release Date: 2003-11-25

Critical: Extremely critical
Impact: System access
Exposure of sensitive information
Cross Site Scripting
Security Bypass

Where: From remote

Software: Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6




Description:
Multiple vulnerabilities have been identified in Internet Explorer, which 
in combination can be exploited to compromise a user's system.

1) A redirection feature using the "mhtml:" URI handler can be exploited to 
bypass a security check in Internet Explorer, which normally blocks web 
pages in the "Internet" zone from parsing local files.

2) The above redirection feature can also be exploited to download and 
execute a malicious file on a user's system. Successful exploitation 
requires that script code can be executed in the "MyComputer" zone.

3) A cross-site scripting vulnerability can be exploited to execute script 
code in the security zone associated with another web page if it contains a 
subframe. This may potentially allow execution of script code in the 
"MyComputer" zone.

4) A variant of a fixed vulnerability can still be exploited to hijack a 
user's clicks and perform certain actions without the user's knowledge.

For more information:
SA9711

5) An error in the download functionality can be exploited to disclose a 
user's cache directory by supplying a "HTM" file extension and an invalid 
value in the "Content-Type:" header field. This issue does not affect all 
versions and may have been fixed by the latest patch for Internet Explorer.

The vulnerabilities have been reported in Internet Explorer 6.0. However, 
other versions may also be affected and have been added due to the 
criticality of these issues.

PoC exploits (Proof of Concept) are available.


Solution:
--------------> Disable Active Scripting.

Use another product.


Reported by / credits:
Liu Die Yu

-------------------------------------------------------------------------










[]s
Fabiano



More information about the gter mailing list