Categories: US-Cert-Repository

Cross-Domain Redirect Vulnerability in Internet Explorer


Systems Affected

  • Microsoft Windows systems

Overview

A cross-domain vulnerability in Internet Explorer (IE) could allow an attacker to execute arbitrary code with the privileges of the user running IE.

Description

There is a cross-domain vulnerability in the way IE determines the security zone of a browser frame that is opened in one domain then redirected by a web server to a different domain. A complex set of conditions is involved, including a delayed HTTP response (3xx status code) to change the content of the frame to the new domain. Vulnerability Note VU#713878 describes this vulnerability in more technical detail and will be updated as further information becomes available.

Other programs that host the WebBrowser ActiveX control or use the MSHTML rendering engine, such as Outlook and Outlook Express, may also be affected.

This issue has been assigned CVE CAN-2004-0549.

Impact

By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker’s document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.

Publicly available exploit code exists for this vulnerability, and US-CERT has monitored incident reports that indicate that this vulnerability is being actively exploited.

Solution

Apply a patch

 

Microsoft has released a cumulative patch (867801) in Security Bulletin MS04-025 which addresses this issue.

Workarounds

Disable Active scripting and ActiveX controls

Disabling Active scripting and ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Disabling Active scripting and ActiveX controls in the Local Machine Zone will prevent widely used payload delivery techniques from functioning. Instructions for disabling Active scripting in the Internet Zone can be found in the Malicious Web Scripts FAQ. See Microsoft Knowledge Base Article 833633 for information about securing the Local Machine Zone. Also, Service Pack 2 for Windows XP (currently at RC1) includes these and other security enhancements for IE.
 

Do not follow unsolicited links

Do not click on unsolicited URLs received in email, instant messages, web forums, or internet relay chat (IRC) channels. While this is generally good security practice, following this behavior will not prevent exploitation of this vulnerability in all cases.

Maintain updated anti-virus software

Anti-virus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely solely on anti-virus software to defend against this vulnerability. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.

 

Appendix B. References

  • Microsoft Security Bulletin MS04-025 – <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
  • Vulnerability Note VU#713878 – <http://www.kb.cert.org/vuls/id/713878>
  • US-CERT Technical Cyber Security Alert TA04-212A – <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
  • Malicious Web Scripts FAQ – <http://www.cert.org/tech_tips/malicious_code_FAQ.html#steps>
  • Computer Virus Resources – <http://www.us-cert.gov/reading_room/virus.html>
  • CVE CAN-2004-0549 – <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0549>
  • Microsoft Knowledge Base Article 833633 – <http://support.microsoft.com/default.aspx?scid=833633>
  • Windows XP Service Pack 2 RC1 – <http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx>
  • Increase Your Browsing and E-Mail Safety – <http://www.microsoft.com/security/incident/settings.mspx>
  • Working with Internet Explorer 6 Security Settings – <http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx>

 


Public incidents related to this vulnerability were reported by Rafel Ivgi. Thanks to Jelmer for further research and analysis.


Feedback can be directed to the author: Art Manion.


Revision History

  • June 11, 2004: Initial release
    July 30, 2004: Added links to MS04-025
    December 3, 2004: Added reference to TA04-212A
     

    Last updated 



Source link

admin

Share
Published by
admin

Recent Posts

Multiple Vulnerabilities in ISC DHCP 3

Systems Affected ISC DHCP versions 3.0.1rc12 and 3.0.1rc13 Overview Two vulnerabilities in the ISC DHCP…

1 day ago

Internet Explorer Update to Disable ADODB.Stream ActiveX Control

Systems Affected   Microsoft Windows systems   Overview   Microsoft has released a security update…

2 days ago

Important Internet Explorer Update Available

Systems Affected   Systems running Internet Explorer and Microsoft Windows   Overview   Microsoft has…

3 days ago

Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express

Systems Affected   Microsoft Windows Systems   Overview   Microsoft has released a Security Bulletin…

4 days ago

Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express

Systems Affected   Microsoft Windows Systems   Overview   Microsoft has released a Security Bulletin…

5 days ago

New Variant of MyDoom Virus

Systems Affected   Microsoft Windows Systems   Overview   A new variant of the MyDoom…

6 days ago

This website uses cookies.