Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Bug Operating Systems Security Software Windows

MSN, Word Vulnerable To Shell: URI Exploit 392

LnxAddct writes "InfoWorld is reporting that a few Microsoft products are also vulnerable to the "shell:" scheme vulnerability found in Mozilla last week. These applications include Microsoft Word and MSN Messenger."
This discussion has been archived. No new comments can be posted.

MSN, Word Vulnerable To Shell: URI Exploit

Comments Filter:
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Monday July 12, 2004 @07:45PM (#9681251)
    Comment removed based on user account deletion
  • by ZZeta ( 743322 ) on Monday July 12, 2004 @07:48PM (#9681273)
    Well now, let's see how long it takes for their patch to come out.
  • by afidel ( 530433 ) on Monday July 12, 2004 @07:52PM (#9681310)
    Well since the Mozilla URI exploit was specific to XP I would imagine that these exploits would likewise be limited to a vulnerable OS.
  • Ready...set...GO (Score:4, Insightful)

    by linuxwrangler ( 582055 ) on Monday July 12, 2004 @07:55PM (#9681337)
    By the time the Mozilla story was posted on Slashdot the fix was already available - the link was even posted with the story.

    I don't see a patch posted with this story so I guess there's no way Microsoft can win the patch-speed race for this bug - all we will be able to do is place bets on just how much slower Microsoft is. Predictions, anyone?
  • by LostCluster ( 625375 ) * on Monday July 12, 2004 @07:58PM (#9681355)
    Well, what Microsoft users have shown time and time again is even when the patch does come out, it's often not applied on many machines.
  • by sbszine ( 633428 ) on Monday July 12, 2004 @08:03PM (#9681396) Journal
    Maybe they could delete your hard drive, or open ports to let something really nasty in, or use your email client to send spam. Depending on what it can pass to the shell, this could be very nasty indeed.
  • Re:Goes to show... (Score:5, Insightful)

    by Anonymous Coward on Monday July 12, 2004 @08:04PM (#9681402)
    The URI exploit in its general form is mitigated by the fact that you can't pass any command-line arguments to the command. So you can launch a bunch of Notepads, so what? However, you CAN type a filename in and have it open in its associated application. If that filename is too long, you can exploit a buffer overflow in the helper application. There happens to be a plentitude of client applications on a standard XP box with buffer overflow possibilities. Once you're there, go anywhere you want with the privileges of the user on the XP box (which is usually admin, and if not, you can usually get admin without a lot of effort).

    Anyway, SP2's memory protection would have prevented the overflow attack. It would not have prevented the most general (and less harmful) form of the attack, however.

    What the original poster was probably meaning, if he had a point at all, was that non-Windows systems don't do this sort of "command-line-as-a-protocol" bullshit because it's quite obviously the wrong way to do things. Security through obscurity works in a lot of cases because people think "nobody would EVER design an OS that did THIS" and they never bother to look. Well, now someone's looked and found an ancient kludge coded by someone who probably doesn't even work for MS anymore. And more man-hours are going into fixing this bug than would have gone into creating a proper implementation of whatever this goober was trying to accomplish in the first place.

    That said, Open Source isn't pixie dust that makes everything happy and secure. Stupid things happen in Linux. They just happen in the open where people can find them and fix them before applications start relying on them to function.
  • by Todd Knarr ( 15451 ) on Monday July 12, 2004 @08:06PM (#9681420) Homepage

    I think the handling of this problem demonstrates the difference between Microsoft software and other software like Mozilla. In Mozilla, the problem didn't even require a real patch to fix, just a quick config setting to tell it not to pass things along to the shell: handler. My bet is that fixing Word etc. will require not just multiple registry changes but actual new code to allow shell: to be disabled. And odds on the first thing they try is to just add filters, and we'll see half a dozen iterations of exploits of this using different ways past the filters until MS finally includes a patch to allow it to be disabled.

  • Easy solution (Score:0, Insightful)

    by Anonymous Coward on Monday July 12, 2004 @08:08PM (#9681439)
    There's an easy solution to this. In fact, I'm using the solution right now.

    I'm typing this on my computer running Windows 98. This overlooked operating system doesn't have the bloat that other OS's have, and it's a lot more secure. We don't even have the shell protocol, so there's no shell exploit to worry about it. Just turn off file sharing, use Mozilla, and everything's great.

  • "Exploit" (Score:2, Insightful)

    by Lord Bitman ( 95493 ) on Monday July 12, 2004 @08:13PM (#9681473)
    "This can be done easily with notepad. Click here to open notepad"

    You know, some "it's not a bug, it's a feature" things really are features. I dont see how this is worse than while(true) { window.open(document.location); }
  • Re:Goes to show... (Score:3, Insightful)

    by Frizzle Fry ( 149026 ) on Monday July 12, 2004 @08:17PM (#9681508) Homepage
    Oh good, I'll go and download SP2 then

    Good. Go download it [microsoft.com]. Or don't. But at least don't be a hypocrite like half the people here and say that sp2 "doesn't count" until it reaches final release form, while firefox "counts" even though it's also in pre-release form (not even at 1.0 yet). Sort of like when people claim that IE on xp doesn't have popup blocking but firefox does.
  • by fireman sam ( 662213 ) on Monday July 12, 2004 @08:19PM (#9681527) Homepage Journal
    So, perhaps Mozilla should have "bug fixes" for every windows flaw that they uncover? Wouldn't that introduce quite a bit of bloat?

    Every application that uses this scheme is vulnerable.

    Maybe someone should check to see if IE has this "bug" as well.

  • Mozilla flaw? (Score:5, Insightful)

    by ScriptGuru ( 574838 ) on Monday July 12, 2004 @08:24PM (#9681560)
    The Article's title is: Microsoft products also vulnerable to Mozilla flaw That is gross misinfomation, it should be something along the lines of "Microsoft products allow exploit of OS flaw, similar to Mozilla." The flaw itself is in the Windows operating system. It exposes access to shell functions that applications need to blacklist. Application developers shouldn't need to be concerned with "Oh, I need to stop that protocol for security." It should be the protocol developer's responsibility to say "Is this safe?"
  • by Slashcrunch ( 626325 ) on Monday July 12, 2004 @08:25PM (#9681573) Homepage
    The title is quite misleading on first glance.

    "Microsoft products also vulnerable to Mozilla flaw"

    If it was a Mozilla flaw to start with, my linux boxes would be vulnerable. I know its picky, but the title is not accurate IMHO as Mozilla is being used to take advantage of a Windows feature, rather than the flaw itself existing in Mozilla.
  • by Demanche ( 587815 ) <chris.h@rediffmail.com> on Monday July 12, 2004 @08:27PM (#9681582)
    To try out open source browsers like Firefox and Mozilla....

    Maybe its about time for some people to concider some alternate producivity suites - not just openoffice - even some suites like Corel have some intriguing software that lacks the user base of microsoft.

    Rant>./rant

    On a sidenote.. Corel lost a big share of its market to MS Office around the same time Netscape was crushed by IE. I remember my highschool used Corel at the time. Netscape was very smart to start the Mozilla Foundation insead of trying to beat MS, they are letting their supporters promote for them, gaining them some brand awareness if nothing else. Perhaps It wouldn't be so strange if Corel was to support a open source initiative, or merge with OpenOffice. The next best thing since frozen coffee for the computer geeks would be firefox and corel. Corel could sure use some geek to geek praising around now ;)

    For those of you not very firmiliar with Corel, at one point they were doing fairly well, then they kinda fell thru - had to lay off alot of people and are now trying to get back into the market.. but I personally think they face the same fate as Netscape.
    In the real world, If you loose a customer, it takes twice as long to get that customer to come back to your business, and that customer is a big factor keeping other possible business from you, as they will tell at least 10 people of their experiance.
    Based on this, even old Corel users would be hesitant or unwilling to switch back to Corel -so Corel needs a new movement. Open source anyone ;)

    Dying Proprietary Software + Open Source = Improved Code + Brand Awareness + "PROFIT" (Donations, Memberships? Support? and Smart Usage Of Your Brand Recognition)

    With so many software companies expected to bust with news of the markets this week, I wouldn't be surprised to see a few new related open source projects pop up.

    Rant> logout
  • Re:Goes to show... (Score:5, Insightful)

    by Anonymous Coward on Monday July 12, 2004 @08:31PM (#9681608)
    Okay, I'll bite. Some of us have a standard of stability and completeness, totally independent of version numbers. Was Internet Explorer 1.0 a happy, complete, stable application? Is Firefox 0.9.1? I think you're fooling yourself if you think version numbers provide any sort of yardstick of the readiness-to-use of an application. I personally won't use ANY Microsoft product in a production (read: at work) environment until it has at least TWO service packs. Windows, Office, SQL, SMS, doesn't matter. Microsoft's standard is "it's 1.0 when we need to release it. it's sp2 when it's ready for prime time". Not all companies are the same way. Corel has yet to release a product ready for prime time, and WordPerfect's up to 12 or so. Cisco, when motivated, can get things done right in the first release. Open Source projects all have their own standards. Firefox 0.9.1 is much more mature and ready for prime-time than the latest PR or SP2. The Xine maintainers, who must all be insane,
    have a project that's been stable for years and it hasn't hit 1.0 yet. If Firefox suddenly released 2.0 would it sudenly be more mature? How about 3.0? What's the magic happy number? THERE IS NONE. You have to gauge each vendor, and each application, by a consistent set of rules and just forget what version number the marketing people decided it should have.
  • A URI exploit in Word is a relatively minor issue, so long as Word contains a macro language that can execute arbitrary code. It's kind of like worrying about whether you left the stove on when you're fleeing because there's a cruise missile targeting your home.
  • Re:Goes to show... (Score:5, Insightful)

    by Flower ( 31351 ) on Monday July 12, 2004 @08:39PM (#9681670) Homepage
    You damn well bet it doesn't count here at work. My patching an application is entirely different than upgrading the OS with a beta service pack. I would have to go through all our departments, make sure I tweak the upgrade so it doesn't break any of the services that make us money and then go through the whole deal again once the official release is out.

    There is a big difference between the degree of risk I take with upgrading Firefox and the major overhaul that SP2 is going to turn out being. Sorry but this hypocrite isn't buying your assertion.

  • by spitzak ( 4019 ) on Monday July 12, 2004 @08:52PM (#9681773) Homepage
    This is not really accurate. The Mac had a unique exploit, in that something a url did would "register" a new protocol handler. The page could then send a request for that protocol and it could execute arbitrary code supplied by the page. The second step is equivalent to the shell exploit, but without the first part it is limited to executing code already installed on the system (not that this is good, but it does not seem as bad...)

    On Windows I don't believe you can register a new protocol unless you actually execute a program. If there was a bug that allowed new protocols to be registered it would pretty much mean it is a bug that allowed arbitrary code to be executed, which would be a huge hole whether or not protocols could be registered.
  • Re:Goes to show... (Score:3, Insightful)

    by BoldAndBusted ( 679561 ) on Monday July 12, 2004 @08:56PM (#9681804) Homepage

    Um, well, the difference here, my friend, is that one is an upgrade for an application (Mozilla Firefox), and the other is an upgrade for an entire operating system (Windows XP). One risks the ability to browse , the other risks the ability to boot .

    Prudent people might be willing to risk blowing up their pre-release browser for functionality and security, while not be willing to risk blowing up their entire OS with a pre-release patch just to get their browser updated...

  • The Mac had a unique exploit, in that something a url did would "register" a new protocol handler.

    That's the first I've heard of it.

    The disk: URL would map a n internet enabled disk image into the file system in a known place, and a following file: URL would execute code from the disk. This is the same kind of privilege escalation as on the Windows exploit that involved knowning the name of the temporary file that a web page or mail message was stored in, and then providing a file: URL that would load it with local privileges.

    The fundamental problem is that the application, Safari or Internet Explorer, automatically uses all protocol handlers or helper apps anyone has registered, instead of only using those that have been marked (by being registered with the application, or by being registered with a special flag) as 'internet safe', and handling pages itself in a sandbox rather than handing them off to a more gullible application.

    There are just so many exploits, no matter what the details, that depend on this charmingly naive "security model' that it should have gone on the junkheap long since.
  • Re:Goes to show... (Score:2, Insightful)

    by Frizzle Fry ( 149026 ) on Monday July 12, 2004 @09:02PM (#9681842) Homepage
    First, it's not a Mozilla exploit, it's a Windows exploit.

    No, it's a Mozilla exploit. Mozilla was passing unverified user input to the shell (to Windows) and effectively telling Windows "I want you to run this program". Windows would then run the program. The bug here is that Mozilla should not be giving untrusted input to the operating system. The bug is not the fact that it is possible to pass something to the OS in that way, it's that Mozilla was not validating what input it was passing. Not blindly trusting user input is one of the first prinicpals of writing secure code, and Mozilla neglected that pricipal while IE didn't (but apparently MSN and Word did). It was probably a good idea to remove this from the OS (as was apparently done in xp sp2) since it was being abused, but it was not a "bug" in Windows. There was also a pretty short article in eweek [eweek.com] about the topic which you might find interesting.
  • Re:Fixed in SR2? (Score:3, Insightful)

    by LO0G ( 606364 ) on Monday July 12, 2004 @09:14PM (#9681924)
    Right now, the Microsoft bug's a concept, not a bug.

    So you're saying that it's ok for Microsoft to wait two years to fix it?

    I didn't think so.
  • Re:Goes to show... (Score:3, Insightful)

    by Tony-A ( 29931 ) on Monday July 12, 2004 @09:28PM (#9682022)
    But at least don't be a hypocrite like half the people here and say that sp2 "doesn't count" until it reaches final release form, while firefox "counts" even though it's also in pre-release form

    Well, when Microsoft can do the equivalent of:
    Run old version.
    Install new version.
    Run new version.
    Decide you don't like it and reinstall old version.

    It's not a level playing field. Half-baked open source "counts" whereas Microsoft's "almost" doesn't. Works like the beta of alpha-beta statistical errors.
  • by Anonymous Coward on Monday July 12, 2004 @09:34PM (#9682059)
    There is a pretty big difference between the amount of shit piled on top of Mozilla vs Word/MSN. Consider all of the applications (corporate mostly, but not entirelly) that use Word at some point internally.

    Even if they had a patch right away, it would take a while to put it through the QA labs at MS to ensure it doesn't break anything vital. Mozilla just rolled the patch into a nightly build, ran some unit tests and released it. They didn't have to worry about it breaking 6,000 custom designed applications.
  • by MagicBox ( 576175 ) on Monday July 12, 2004 @10:36PM (#9682450)
    to *bash* Microsoft yet again. The article clearly stated that

    Microsoft's MSN Messenger and Word word processing application both support a feature that could give remote users access to functions that could be used launch applications on Windows computers, .....


    Unless the SECUNIA people are stupid, launching an app from within another app is what every Microsoft Application is able to do and has been able to do for many years. However I do not think that such feature exists for Microsoft products only. What I am having a hard time distingushing is between Secunia trying to stay on the news and a real vulnerability here. I am not saying it might not exist, but as of this moment I do not see anyone able to run a Shell() command within your app, unless they have gotten to your app, which means they have gotten to your computer already. Also this has existed for a long time. Why now? I might be completely wrong however, and someone at Secunia knows something they are not sharing. I advise them to share any info as soon as possible. The reason I am a little pissed is because in my company I have thousands of Word and Excel documents with thousands of lines of VBA code. With news like this, I smell a panic meeting early in the morning tomorrow which might be nothing more than FUD from Secunia. Honestly I am at a point where I am having a hard time trusting anyone anymore. Hackers want to be my security gurus, OS makers rant and rave about their respective OSes and how secure and reliable they are(only to issue security patches soon after), whole campaigns asking people to boycot a product because of vulnerabilities and use X product, only to find out that X is vulnerable as well. If you look at the stack of firewalls and security appliances at my company, it looks like we're building the walls of damn Troy. I joke with the security guys about the kind of attack they are preparing against. There is hope of course.....but how long before it's too late?
  • by qtp ( 461286 ) on Monday July 12, 2004 @10:56PM (#9682562) Journal
    I'm going to agree with you.

    This is not a flaw in Mozilla, nor is it a flaw in IE, Outlook, Word, or any other part of Microsoft Office.

    This flaw is a flaw in Windows, and is typical of flaws in Windows in that the OS is expecting it's applications to handle security, will run any peice of crap handed to it by any app, and we can expect to see more flaws that are similar in nature due to the heavily integrated design of the Windows operating system.

  • Re:Mozilla flaw? (Score:3, Insightful)

    by ScriptGuru ( 574838 ) on Monday July 12, 2004 @11:06PM (#9682618)
    Come now. What if I were to write a service called "delete:///" for the sole purpose of deleting files? The standard for Windows applications, IE and Moz included, is to say "Can I open this? I can't? Okay, who here can? ... Okay, go for it!" So, if someone notices that there's a population of machines with "delete:///" on them and uses it to slate a bunch of computers, whose fault is it, mine or Mozilla's?

    Of course, they could whitelist, say "Okay, only telnet:, ssh:, and aim: can go through." But this really isn't viable because it breaks the principle of things just working because future additions won't work.

    The simple truth of it is, without adding layers to the system, like a shell: blocker, is to be accountable when programming a protocol.
  • by jesser ( 77961 ) on Monday July 12, 2004 @11:07PM (#9682624) Homepage Journal
    As several people on Full Disclosure pointed out to you, you misunderstood the original vulnerability: the Microsoft products you cite raise a warning dialog when you traverse the link by hand.

    (I didn't see anyone say that on Full Disclosure.)

    You're wrong. Neither of the programs I tested raised a warning dialog. A newer version of Word does, though, as pointed out by several Slashdotters.

    In neither case does the link "self execute" -- you need to ation on it to cause the problem.

    The only action required in both programs is activating a link. Activating a link is supposed to be safe.

    Chasing a link that raises an error box, and then clicking "OK" -- that's stupid and dengerous.

    Depending on the wording of the warning dialog, it might not be stupid.

    If the warning is 100% jargon, as in "This link uses the shell: protocol. Do you want to proceed?", only someone very geeky or very paranoid would click Cancel. I think AIM or Gaim or Trillian has a dialog like this.

    If the warning says "Hyperlinks can be harmful to your computer and data. Do you want to continue?", many users will think "Huh? Hyperlinks have to be safe; I click them in web pages all the time." and click OK. Word 2003 has a dialog like this and doesn't show it for "safe" protocols. [slashdot.org]
  • by walt-sjc ( 145127 ) on Monday July 12, 2004 @11:29PM (#9682731)
    That's becaues it's NOT a bug in mozilla, it's a massive security hole in Windows. Mozilla finally decided to patch it for mozilla because MS was too damned lazy to fix it. As we now see, this massive windows hole affects other products too. Of course, NO other platform has this particular security hole (surprise surprise...)

    If your flash plugin had a security hole, would you expect Mozilla, Opera, IE, etc to filter certain access so that security hole could't be exploited?

    No, MS is responsible for the security of their own products.
  • Re:Goes to show... (Score:3, Insightful)

    by walt-sjc ( 145127 ) on Monday July 12, 2004 @11:41PM (#9682778)
    It's AMAZING what you can do in 500 bytes... Some of the recent worms are good examples.
  • by kai.chan ( 795863 ) on Tuesday July 13, 2004 @12:07AM (#9682906)
    What I don't get is why the article word the sentences so that it sounds like Microsoft software was just found to be sharing the same vulnerability as Mozilla, when in reality, the exploit stemmed from Microsoft to begin with.

    As always, I like how the last paragraph shows Microsoft's dislike for people to post Microsoft security flaws for the world to see.
  • by sw155kn1f3 ( 600118 ) on Tuesday July 13, 2004 @12:45AM (#9683108)
    Hey!
    Do you know the first rule of secure programming?
    DO NOT trust input data.
    If browser gets data and blindly passes it to the OS, well.. that's a bad browser. I don't see MS fault at all.
  • by csk_1975 ( 721546 ) on Tuesday July 13, 2004 @01:56AM (#9683370)
    I'm sorry, but if it takes 24 days to get past the name calling when confronted with a security flaw deemed major, OSS doesn't stand a chance.

    I don't understand what the problem is here. The OS in OSS means "Open Source". You have the source so (if you have the ability) you can fix the bug - and if you are civic minded enough you can submit your patch and give something back to the project. This is why OSS does stand a chance.

    "Use the SOURCE Luke"
  • by Gordonjcp ( 186804 ) on Tuesday July 13, 2004 @03:01AM (#9683612) Homepage
    It's nothing to do with the browser. Read the bug report. Find and read the relevant MSDN article, if you like. It is not even a bug in Windows. Windows does not pass the security information between partitions.
  • by shaitand ( 626655 ) * on Tuesday July 13, 2004 @07:04AM (#9684320) Journal
    The browser checks to see if it knows what to do with it, generally if it does, it blindly passes it to another application (plugin or whathaveyou), if not it blindly passes it to the OS which may or may not have a handler for that type.

    First there shouldn't even be a shell uri in the OS! Second, there is a vulnerability IN THE SHELL URI which escalates the priv level to that of the user.

    If Mozilla passed the data along and said, here ya go it's good stuff, completely trusted. That would be one thing, but mozilla passes it along and says I have no clue what this is or where it's coming from and have no reason to believe it safe in any fashion. You have any ideas?

    If it's the RIGHT data, then windows tells itself it was the current user and not some untrusted guy off the web who gave it that data. The bug is in windows!

    Hell the entire scheme or uri handling in windows is fscked up. There shouldn't be any uris which cause local execution!
  • by shaitand ( 626655 ) * on Tuesday July 13, 2004 @07:14AM (#9684346) Journal
    Mozilla passes it with the appropriate security level, indicated it's unfiltered unchecked data coming from the web. They are doing exactly what they are supposed to.

    And the whole reason the browser is passing it is because it's NOT a known uri type (who would expect there to be a shell uri, what kind of idiot comes up with the brilliant idea for a shell uri to begin with?).

    This is windows, remember that most uri types aren't documented. Since we are only talking about unknown datatypes, it's a safe bet the browser will never know how to treat them. Which is why it does what it's supposed to do and passes it to the OS clearly labeled as hazardous nuclear waste.

    Rarely useful?! At least half the media types you load are able to function due to this feature? (assuming you use Mozilla).

    There is a security scheme in place in windows for this type of content for just this purpose. Mozilla handles this the way a windows application is supposed to do it. If the security scheme is broken it's 100% a microsoft issue.

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...