[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: First vulnerabilities in the SP2 - XP ?...



> From: Radoslav Dejanović [mailto:radoslav.dejanovic@xxxxxxxx] 
> > On Monday 16 August 2004 15:58, Jrme ATHIAS wrote:
> > http://www.heise.de/security/artikel/50051

> This might be SP2 bug only if the same bug can't be repeated 
> on pre-SP2 machine. Didn't test, but I think this is an old 
> trick. Anyone care to test it?

The entire concept of the Zone.Identifier altenate data stream is new to XPSP2. 
Whenever you download any file from the web IE will add an ADS called 
Zone.Identifier which specifies what IE security zone the file originated from. 
Later, when the user tries to execute this file, Explorer itself will check for 
this ADS. If it does not exist Explorer will simply execute the file as it has 
always done, but if it does exist and it specifies the Internet zone Explorer 
will then check for a valid digital signature. If such a signature is not found 
Explorer will prompt the user and ask whether to execute this unknown 
executable from an unknown publisher.

Regardless of whether we think this has a high practical impact the advisory 
from Jürgen does specify a way to circumvent a desired security functionality 
which has been addded to XPSP2. Circumventing a desired security functionality 
is always interested, especially seeing as this is one of many first steps in a 
move toward digitally signing all executables on the Windows platform.



Regards

Thor Larholm
Senior Security Researcher
PivX Solutions
23 Corporate Plaza #280
Newport Beach, CA 92660
http://www.pivx.com
thor@xxxxxxxx
Stock symbol: (PIVX.OB)
Phone: +1 (949) 231-8496
PGP: 0x4207AEE9
B5AB D1A4 D4FD 5731 89D6  20CD 5BDB 3D99 4207 AEE9

PivX defines a new genre in Desktop Security: Proactive Threat Mitigation. 
<http://www.pivx.com/qwikfix>