Kłopoty Windowsa, ciąg dalszy
Tym razem jednak dotyczy ona Internet Explorera w wersji 5 i wyższych a także Outlook Express.
Wykryta usterka pozwala, nawet przy wyłączonym Active Scripting, wykorzystywać specjalnie stworzone wiadomości w formacie HTML do przeglądania plików na maszynie użytkownika. Jak podaje Georgi Guninski w swojej informacji, możliwe jest uruchomienie Active Scripting przy pomocy XML lub XSL nawet w przypadku gdy Active Scripting jest wyłączony. Georgi Guninski poinformował jednocześnie, że zawiadomił o problemie także firmę Microsoft. Jej przedstawiciele nie udzielali żadnych dodatkowych komentarzy
Georgi Guninski security advisory #43, 2001
XML scripting in IE, Outlook Express
Systems affected:
Internet Explorer 5.x – including full patched up to now though Microsoft cannot reproduce the problem on fully patched IE 5.x ,Outlook Express (probably Outlook have not tested)
Risk: High
Date: 20 April 2001
Legal Notice:
This Advisory is Copyright (c) 2001 Georgi Guninski. You may distribute it unmodified. You may not modify it and distribute it or distribute parts of it without the author’s written permission.
Disclaimer:
The information in this advisory is believed to be true based on experiments though it may be false. The opinions expressed in this advisory and program are my own and not of any company. The usual standard disclaimer applies, especially the fact that Georgi Guninski is not liable for any damages caused by direct or indirect use of the information or functionality provided by this advisory or program. Georgi Guninski bears no responsibility for content or misuse of this advisory or program or any derivatives thereof.
Background:
We have some disagreement with Microsoft whether this works on fully patched IE 5.x. I believe I am running fully patched IE according to the rules for patching in Microsoft’s security bulletins. The problem seems to be the version of WSH which is described in MS-01-015 at:
http://www.microsoft.com/technet/security/bulletin/ms01-015.asp
To check whether you are vulnerable check DEMONSTRATION.
Description:
It is possible to execute Active Scripting with the help of XML and XSL even if Active Scripting is disabled in all security zones. This is especially dangerous in email messages. Though this is not typical exploit itself, it may be used in other exploits especially in email.
Vendor status:
Microsoft was informed on 18 April 2001
Regards,
Georgi Guninski